The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Cisco Security Agent Vulnerable to Crafted IP Attack


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 15 Jan 2006 19:04:47 +0200
Subject: [NT] Cisco Security Agent Vulnerable to Crafted IP Attack
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060116095841.4D44E573C@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco Security Agent Vulnerable to Crafted IP Attack
------------------------------------------------------------------------


SUMMARY

Cisco Security Agent (CSA) is "a network security software agent that 
provides threat protection for server and desktop computing systems".

A malicious attacker may be able to send a crafted IP packet to a Windows 
workstation or server running CSA 4.5 which may cause the device to halt 
and/or reload. Repeated exploitation will create a sustained DoS (denial 
of service).

DETAILS

Vulnerable Systems:
 * Cisco CSA version 4.5 when running on any Windows except Windows XP.

Immune Systems:
 * Cisco CSA 4.0 and earlier
 * Cisco CSA while running on Solaris
 * Cisco CSA while running on Linux
 * Cisco CSA while running on Windows XP

If a crafted IP packet with certain characteristics are sent to a Windows 
platform running CSA 4.5, Windows will halt with a blue screen and system 
crash. When exploited, the affected machine will require a reboot to 
become operational again.

Successful exploitation of this vulnerability will cause a reload of the 
affected machine.

This vulnerability is documented in the Cisco Bug Toolkit as Bug ID 
CSCsa85175

This issue is fixed in CSA maintenance version 4.5.1.616 which is 
available for download at:
 <http://www.cisco.com/cgi-bin/tablebuild.pl/csa.>; 
http://www.cisco.com/cgi-bin/tablebuild.pl/csa.

This issue is also fixed with CSA hotfix version 4.5.0.573 or later which 
is available for download at:
 <http://www.cisco.com/cgi-bin/tablebuild.pl/csahf-crypto>; 
http://www.cisco.com/cgi-bin/tablebuild.pl/csahf-crypto

Workarounds:
There are no recommended workarounds for this vulnerability. Please see 
the Obtaining Fixed Software section for appropriate solutions to resolve 
this vulnerability.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20050713-csa.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20050713-csa.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру