CVE-2003-0982
CVSS7.5
发布时间 :2004-01-05 00:00:00
修订时间 :2008-09-05 16:35:43
NMCO    

[原文]Buffer overflow in the authentication module for Cisco ACNS 4.x before 4.2.11, and 5.x before 5.0.5, allows remote attackers to execute arbitrary code via a long password.


[CNNVD]Cisco ACNS验证库远程缓冲区溢出漏洞(CNNVD-200401-016)

        
        Cisco ACNS为新一代思科企业内容供应网络解决方案。
        Cisco ACNS的验证库存在缓冲区溢出问题,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以进程权限执行任意指令或进行拒绝服务攻击。
        通过可以提交超长的密码,在ACNS验证模块上触发缓冲区溢出,精心构建提交数据可能以进程权限在系统上执行任意指令。当然此问题也可以造成设备拒绝服务。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cisco:content_engine:507
cpe:/a:cisco:content_engine:560_4.1
cpe:/a:cisco:application_and_content_networking_software:4.2.9Cisco Application and Content Networking Software 4.2.9
cpe:/a:cisco:content_engine:560_4.0
cpe:/a:cisco:content_distribution_manager_4650:4.0Cisco Content Distribution Manager 4650 4.0
cpe:/a:cisco:content_engine:590
cpe:/a:cisco:content_engine:560_2.2_.0
cpe:/a:cisco:content_distribution_manager_4630:4.1Cisco Content Distribution Manager 4630 4.1
cpe:/a:cisco:content_engine:590_2.2_.0
cpe:/a:cisco:content_engine:507_4.1
cpe:/a:cisco:content_distribution_manager_4630:4.0Cisco Content Distribution Manager 4630 4.0
cpe:/a:cisco:application_and_content_networking_software:5.0.1Cisco Application and Content Networking Software 5.0.1
cpe:/a:cisco:content_engine:7320_3.1
cpe:/a:cisco:content_engine:560_3.1
cpe:/a:cisco:content_engine_module:for_cisco_router_2600_series
cpe:/a:cisco:application_and_content_networking_software:4.1.1Cisco Application and Content Networking Software 4.1.1
cpe:/h:cisco:content_router_4450Cisco Content Router 4450
cpe:/a:cisco:content_engine:590_4.1
cpe:/h:cisco:content_router_4430Cisco Content Router 4430
cpe:/a:cisco:content_engine:507_4.0
cpe:/a:cisco:content_distribution_manager_4650:4.1Cisco Content Distribution Manager 4650 4.1
cpe:/a:cisco:content_engine:7320_4.0
cpe:/a:cisco:content_engine:590_3.1
cpe:/a:cisco:content_engine:7320_2.2_.0
cpe:/a:cisco:content_engine:590_4.0
cpe:/a:cisco:content_distribution_manager_4630Cisco Content Distribution Manager 4630
cpe:/a:cisco:content_distribution_manager_4650Cisco Content Distribution Manager 4650
cpe:/a:cisco:content_engine_module:for_cisco_router_3600_series
cpe:/a:cisco:content_engine:507_2.2_.0
cpe:/o:cisco:content_router_4430:4.0
cpe:/a:cisco:content_engine_module:for_cisco_router_3700_series
cpe:/a:cisco:application_and_content_networking_software:5.0.3Cisco Application and Content Networking Software 5.0.3
cpe:/a:cisco:content_engine:560
cpe:/a:cisco:application_and_content_networking_software:4.2.7Cisco Application and Content Networking Software 4.2.7
cpe:/a:cisco:application_and_content_networking_software:5.0Cisco Application and Content Networking Software 5.0
cpe:/a:cisco:application_and_content_networking_software:4.2Cisco Application and Content Networking Software 4.2
cpe:/o:cisco:content_router_4430:4.1
cpe:/a:cisco:content_distribution_manager_4670Cisco Content Distribution Manager 4670
cpe:/a:cisco:application_and_content_networking_software:4.0.3Cisco Application and Content Networking Software 4.0.3
cpe:/a:cisco:content_engine:7320_4.1
cpe:/a:cisco:content_engine:7320
cpe:/a:cisco:application_and_content_networking_software:4.1.3Cisco Application and Content Networking Software 4.1.3
cpe:/a:cisco:content_engine:507_3.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0982
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0982
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200401-016
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/352462
(UNKNOWN)  CERT-VN  VU#352462
http://www.securityfocus.com/bid/9187
(VENDOR_ADVISORY)  BID  9187
http://www.cisco.com/warp/public/707/cisco-sa-20031210-ACNS-auth.shtml
(VENDOR_ADVISORY)  CISCO  20031210 Vulnerability in Authentication Library for ACNS
http://xforce.iss.net/xforce/xfdb/13945
(UNKNOWN)  XF  cisco-acns-password-bo(13945)
http://secunia.com/advisories/10409
(UNKNOWN)  SECUNIA  10409

- 漏洞信息

Cisco ACNS验证库远程缓冲区溢出漏洞
高危 未知
2004-01-05 00:00:00 2005-10-20 00:00:00
远程  
        
        Cisco ACNS为新一代思科企业内容供应网络解决方案。
        Cisco ACNS的验证库存在缓冲区溢出问题,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以进程权限执行任意指令或进行拒绝服务攻击。
        通过可以提交超长的密码,在ACNS验证模块上触发缓冲区溢出,精心构建提交数据可能以进程权限在系统上执行任意指令。当然此问题也可以造成设备拒绝服务。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用如下命令关闭CE GUI服务来暂时修补此问题:
        no gui-server enable
        厂商补丁:
        Cisco
        -----
        Cisco ACNS 4.2.11和5.0.5已经修补此问题,5.1 Release也不存在此漏洞,建议用户通过Cisco software Center获得升级程序:
        
        http://www.cisco.com/

        要访问此下载URL,你必须是注册用户和必须登录后才能使用。
        事先或目前与第三方支持组织,如Cisco合作伙伴、授权零售商或服务商之间已有协议,由第三方组织提供Cisco产品或技术支持的用户可免费获得升级支持。
        直接从Cisco购买产品但没有Cisco服务合同的用户和由第三方厂商购买产品但无法从销售方获得已修复软件的用户可从Cisco技术支持中心(TAC)获取升级软件。TAC联系方法:
         * +1 800 553 2447 (北美地区免话费)
         * +1 408 526 7209 (全球收费)
         * e-mail: tac@cisco.com
        
        查看
        http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
获取额外的TAC联系信息,包括特别局部的电话号码,各种语言的指南和EMAIL地址。

- 漏洞信息

2957
Cisco ACNS Authentication Module Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Cisco Application and Content Network Service (ACNS), on Cisco Content Routers and Content Engines for Routers, contains a flaw that may allow a malicious user to execute aritrary code on the server. The issue is triggered when an overly long password is sent to the GUI. It is possible that the flaw may allow denial of service or inappropriate access resulting in a loss of control of the server.

- 时间线

2003-12-10 2003-12-10
Unknow Unknow

- 解决方案

Upgrade to version 4.2.11 or 5.0.5 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Disable the GUI by executing 'no gui-server enable'

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站