CVE-2004-1099
CVSS10.0
发布时间 :2005-01-10 00:00:00
修订时间 :2008-09-05 16:40:23
NMCO    

[原文]Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.


[CNNVD]Cisco ACS 绕过身份认证漏洞(CNNVD-200501-056)

        Cisco Secure Access Control Server(ACS)是一套网络用户接入认证管理系统。
        ACS Windows和ACS Solution Engine 3.3.1在启用EAP-TLS协议时,不能正确处理已过期或不可信证书。
        远程攻击者可以借助一个包含用户名等有效字段的"cryptographically correct"证书,绕过验证并获得未经授权的访问。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cisco:secure_access_control_server:3.3.1
cpe:/a:cisco:secure_access_control_server:3.3%281%29
cpe:/a:cisco:secure_acs_solution_engineCisco Secure ACS Solution Engine
cpe:/a:cisco:secure_access_control_server_solution_engine:3.3.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1099
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1099
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-056
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/11577
(VENDOR_ADVISORY)  BID  11577
http://www.ciac.org/ciac/bulletins/p-028.shtml
(VENDOR_ADVISORY)  CIAC  P-028
http://xforce.iss.net/xforce/xfdb/17936
(VENDOR_ADVISORY)  XF  ciscosecure-eaptls-auth-bypass(17936)
http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
(VENDOR_ADVISORY)  CISCO  20041102 Vulnerability in Cisco Secure Access Control Server EAP-TLS Authentication

- 漏洞信息

Cisco ACS 绕过身份认证漏洞
危急 未知
2005-01-10 00:00:00 2005-10-20 00:00:00
远程  
        Cisco Secure Access Control Server(ACS)是一套网络用户接入认证管理系统。
        ACS Windows和ACS Solution Engine 3.3.1在启用EAP-TLS协议时,不能正确处理已过期或不可信证书。
        远程攻击者可以借助一个包含用户名等有效字段的"cryptographically correct"证书,绕过验证并获得未经授权的访问。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml

- 漏洞信息

11379
Cisco Secure Access Control Server EAP-TLS Authentication Bypass
Remote / Network Access Authentication Management
Loss of Confidentiality
Exploit Public

- 漏洞描述

Secure Access Control Server for Windows and Secure Access Control Server Solution Engine, when they are configured to use Extensible Authentication Protocol-Transport Layer Security (EAP-TLS), contain a flaw that may allow an attacker to bypass security authentication. The issue is triggered when the attacker authenticates using a cryptographically correct certificate containing a valid username. It is possible that the flaw may allow the attacker access to the entire network resulting in a loss of confidentiality. Note: this vulnerability is not exploitable if EAP-TLS is configured with binary comparison of user certificates as the only comparison method and if the user entry in Lightweight Directory Access Protocol/Active Directory (LDAP/AD) contains only valid certificates.

- 时间线

2004-11-02 Unknow
2004-11-02 Unknow

- 解决方案

Upgrade to version 3.3.2 or higher, as it has been reported to fix this vulnerability. Additionally, Cisco Systems, Inc. has released patches to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站