CVE-2005-1058
CVSS7.5
发布时间 :2005-05-02 00:00:00
修订时间 :2009-03-04 00:32:17
NMCOS    

[原文]Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote attackers to bypass XAUTH and move to Phase 2 negotiations.


[CNNVD]Cisco IOS非授权创建安全关联漏洞(CNNVD-200505-539)

        Cisco IOS是Cisco网络设备所使用的互联网操作系统。
        Cisco IOS的XAUTH和ISAKMP配置文件存在安全漏洞,可能允许恶意的VPN客户端未经授权访问VPN。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:ios:12.3tCisco IOS 12.3T
cpe:/o:cisco:ios:12.2tCisco IOS 12.2T
cpe:/o:cisco:ios:12.3Cisco IOS 12.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5738Cisco Systems IOS Unauthorized IPSec SA Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1058
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1058
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-539
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml
(VENDOR_ADVISORY)  CISCO  20050406 Vulnerabilities in the Internet Key Exchange Xauth Implementation

- 漏洞信息

Cisco IOS非授权创建安全关联漏洞
高危 竞争条件
2005-05-02 00:00:00 2009-03-04 00:00:00
远程  
        Cisco IOS是Cisco网络设备所使用的互联网操作系统。
        Cisco IOS的XAUTH和ISAKMP配置文件存在安全漏洞,可能允许恶意的VPN客户端未经授权访问VPN。

- 公告与补丁

        暂无数据

- 漏洞信息

15305
Cisco IOS IKE XAUTH ISAKMP IPSec SA Establish Authentication Bypass
Remote / Network Access Authentication Management
Loss of Integrity
Exploit Unknown

- 漏洞描述

Cisco IOS contains a flaw that may allow a malicious user to establish an unauthorized IPSEC SA. The issue is triggered due to an error within the handling of ISAKMP profile attributes. It is possible that the flaw may allow a deadlock condition to arise due to attributes not being processed allowing an attacker to establish an unauthorized IPSEC SA resulting in a loss of integrity.

- 时间线

2005-04-06 Unknow
Unknow Unknow

- 解决方案

Upgrade to version applicable to your release train or higher, as they have been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco IOS Unauthorized Security Association Establishment Vulnerability
Race Condition Error 13033
Yes No
2005-04-06 12:00:00 2009-07-12 11:57:00
This issue was announced by the vendor.

- 受影响的程序版本

Cisco IOS 12.3YK
Cisco IOS 12.3YJ
Cisco IOS 12.3YI
Cisco IOS 12.3YH
Cisco IOS 12.3YG
Cisco IOS 12.3YF
Cisco IOS 12.3YD
Cisco IOS 12.3YC
Cisco IOS 12.3YA
Cisco IOS 12.3XY
Cisco IOS 12.3XX
Cisco IOS 12.3XW
Cisco IOS 12.3XU
Cisco IOS 12.3XT
Cisco IOS 12.3XS
Cisco IOS 12.3XR
Cisco IOS 12.3XQ
Cisco IOS 12.3XN
Cisco IOS 12.3XM
Cisco IOS 12.3XL
Cisco IOS 12.3XK
Cisco IOS 12.3XJ
Cisco IOS 12.3XI
Cisco IOS 12.3XH
Cisco IOS 12.3XG
Cisco IOS 12.3XF
Cisco IOS 12.3XE
Cisco IOS 12.3XD
Cisco IOS 12.3XC
Cisco IOS 12.3XB
Cisco IOS 12.3XA
Cisco IOS 12.3T
Cisco IOS 12.3BW
Cisco IOS 12.3BC
Cisco IOS 12.3B
Cisco IOS 12.3
Cisco IOS 12.2ZP
Cisco IOS 12.2ZN
Cisco IOS 12.2ZL
Cisco IOS 12.2ZK
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZH
Cisco IOS 12.2ZH
Cisco IOS 12.2ZG
Cisco IOS 12.2ZG
Cisco IOS 12.2ZF
Cisco IOS 12.2ZF
Cisco IOS 12.2ZE
Cisco IOS 12.2ZE
Cisco IOS 12.2ZD
Cisco IOS 12.2ZD
Cisco IOS 12.2ZC
Cisco IOS 12.2ZC
Cisco IOS 12.2ZB
Cisco IOS 12.2ZB
Cisco IOS 12.2YY
Cisco IOS 12.2YY
Cisco IOS 12.2YX
Cisco IOS 12.2YX
Cisco IOS 12.2YW
Cisco IOS 12.2YW
Cisco IOS 12.2YW
Cisco IOS 12.2YV
Cisco IOS 12.2YV
Cisco IOS 12.2YU
Cisco IOS 12.2YU
Cisco IOS 12.2YT
Cisco IOS 12.2YT
Cisco IOS 12.2YR
Cisco IOS 12.2YR
Cisco IOS 12.2YQ
Cisco IOS 12.2YQ
Cisco IOS 12.2YP
Cisco IOS 12.2YP
Cisco IOS 12.2YN
Cisco IOS 12.2YN
Cisco IOS 12.2YM
Cisco IOS 12.2YM
Cisco IOS 12.2YL
Cisco IOS 12.2YL
Cisco IOS 12.2YJ
Cisco IOS 12.2YH
Cisco IOS 12.2YG
Cisco IOS 12.2YF
Cisco IOS 12.2YD
Cisco IOS 12.2YB
Cisco IOS 12.2YA
Cisco IOS 12.2XZ
Cisco IOS 12.2XW
Cisco IOS 12.2XM
Cisco IOS 12.2XL
Cisco IOS 12.2XK
Cisco IOS 12.2XK
Cisco IOS 12.2XK
Cisco IOS 12.2XJ
Cisco IOS 12.2XJ
Cisco IOS 12.2T
Cisco IOS 12.2SY
Cisco IOS 12.2SY
Cisco IOS 12.2SXD
Cisco IOS 12.2SXB
Cisco IOS 12.2SXA
Cisco IOS 12.2SX
Cisco IOS 12.2SU
Cisco IOS 12.2JK
Cisco IOS 12.2CZ
Cisco IOS 12.2CY
Cisco IOS 12.2CY
Cisco IOS 12.2CX
Cisco IOS 12.2CX
Cisco IOS 12.2CX
Cisco IOS 12.2BZ
Cisco IOS 12.2BY
Cisco IOS 12.2BX
Cisco IOS 12.2BC
Cisco IOS 12.2B
Cisco IOS 12.2

- 漏洞讨论

Cisco IOS is prone to an issue related to XAUTH and ISAKMP profiles that may allow a malicious VPN client to gain unauthorized access to a VPN.

The vulnerability occurs in a case where attributes in an ISAKMP profile that have been assigned to remote peer are not processed. This will present a window of opportunity for the remote client to initiate Phase 2 IKE negotiation and cause an unauthorized IPSec SA (Security Association) to be established.

It is noted that the vulnerability only affects those ISAKMP profiles that are matched by pre-configured certificate maps.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Cisco has provided a fix matrix for IOS in the attached advisory. Please refer to the advisory for further information. Cisco fixes may be obtained by customers through the regular update channels.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站