Vulnerabilities > CVE-2000-1022 - Unspecified vulnerability in Cisco PIX Firewall Software

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
cisco
nessus
exploit available

Summary

The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands.

Exploit-Db

descriptionCisco PIX Firewall 4.x/5.x SMTP Content Filtering Evasion Vulnerability. CVE-2000-1022. Remote exploit for hardware platform
idEDB-ID:20231
last seen2016-02-02
modified2000-09-19
published2000-09-19
reporterLincoln Yeoh
sourcehttps://www.exploit-db.com/download/20231/
titleCisco PIX Firewall 4.x/5.x SMTP Content Filtering Evasion Vulnerability

Nessus

NASL familyFirewalls
NASL idSMTP_BYPASS_CISCO.NASL
descriptionThe remote SMTP server seems to be protected by a content filtering firewall probably Cisco\
last seen2020-06-01
modified2020-06-02
plugin id10520
published2000-10-04
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10520
titleCisco PIX Firewall Mailguard Feature SMTP Content Filter Bypass
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
  script_id(10520);
  script_version ("1.27");
  script_cve_id("CVE-2000-1022");
  script_bugtraq_id(1698);

  script_name(english:"Cisco PIX Firewall Mailguard Feature SMTP Content Filter Bypass");
  script_summary(english:"Attempts to communicate directly with the remote SMTP server");

   script_set_attribute(
    attribute:'synopsis',
    value:'The remote service is vulnerable to an access control breach.'
  );

  script_set_attribute(
    attribute:'description',
    value:'The remote SMTP server seems to be protected by a content
filtering firewall probably Cisco\'s PIX.

However, an attacker may bypass this content filtering
by issuing a DATA command before a MAIL command,
that allows him to directly communicate with the real SMTP daemon.'
  );

  script_set_attribute(
    attribute:'solution',
    value:'http://www.nessus.org/u?236b35d2'
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(
    attribute:'see_also',
    value:'https://seclists.org/bugtraq/2000/Sep/376'
  );

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/10/04");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/09/19");
 script_cvs_date("Date: 2018/11/15 20:50:22");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Firewalls");
 script_dependencie("find_service1.nasl", "smtpserver_detect.nasl", "sendmail_expn.nasl");
 script_exclude_keys("SMTP/wrapped", "SMTP/qmail", "SMTP/postfix");
 script_require_ports("Services/smtp", 25);
 exit(0);
}

#
# The script code starts here
#

include("smtp_func.inc");
port = get_kb_item("Services/smtp");
if(!port)port = 25;
if (get_kb_item('SMTP/'+port+'/broken')) exit(0);

if(get_port_state(port))
{
 soc = open_sock_tcp(port);
 if(soc)
 {
 data = smtp_recv_banner(socket:soc);
 if(data && ereg(string:data, pattern:"^220.*"))
 {
   cmd = string("HELP\r\n");
   send(socket:soc, data:cmd);
   r = recv_line(socket:soc, length:1024);
   if(ereg(string:r, pattern:"^500.*"))
   {
     cmd = string("DATA\r\n");
     send(socket:soc, data:cmd);
     r = recv_line(socket:soc, length:1024);
     cmd = string("HELP\r\n");
     r = recv_line(socket:soc, length:1024);
     if(ereg(string:r, pattern:"^214.*"))security_hole(port);
   }
 }
 close(soc);
 }
}