Vulnerabilities > CVE-2008-3812 - Unspecified vulnerability in Cisco IOS
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Cisco IOS 12.4, when IOS firewall Application Inspection Control (AIC) with HTTP Deep Packet Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed HTTP transit packet.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 |
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20080924-IOSFWHTTP.NASL |
description | Cisco IOS software configured for IOS firewall Application Inspection Control (AIC) with a HTTP configured, application-specific policy are vulnerable to a denial of service when processing a specific, malformed HTTP transit packet. Successful exploitation of the vulnerability may result in a reload of the affected device. Cisco has released free software updates that address this vulnerability. A mitigation for this vulnerability is available. See the |
last seen | 2020-03-17 |
modified | 2010-09-01 |
plugin id | 49018 |
published | 2010-09-01 |
reporter | This script is (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49018 |
title | Cisco IOS Software Firewall Application Inspection Control Vulnerability |
code |
|
Oval
accepted | 2008-12-22T04:00:06.651-05:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | Cisco IOS 12.4, when IOS firewall Application Inspection Control (AIC) with HTTP Deep Packet Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed HTTP transit packet. | ||||
family | ios | ||||
id | oval:org.mitre.oval:def:5302 | ||||
status | accepted | ||||
submitted | 2008-09-24T11:06:36.000-04:00 | ||||
title | Cisco IOS Firewall Application Inspection Control Vulnerability | ||||
version | 5 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31354 CVE ID: CVE-2008-3812 CNCVE ID:CNCVE-20083812 防火墙是针对组织中网络资产进行访问控制的网络设备,防火墙一般放置在网络入口处,Cisco IOS软件提供一系列安全功能可提供用户配置简单或详细的防火墙策略。 HTTP默认使用80端口对Internet WEB服务进行传送,其由于在网络上的通用性,很少针对其合法性和标准一致性进行挑战,由于80通信一般在网络上都允许而不存在挑战,因此很多应用程序开发者借助HTTP通信作为替代的传送协议允许它们的应用程序通信通过或甚至绕过防火墙设置。当Cisco IOS防火墙配置了HTTP AIC时,可通过对报文执行检测来判断HTTP连接是否在当前安全策略配置中允许,也判断用户是否通过80端口进行隧道化处理。如果报文不顺从HTTP协议标准,报文将被丢弃,连接被重置,并生成syslog消息。 使用HTTP特定应用策略的IOS firewall AIC处理特定的畸形HTTP传送报文时存在问题,成功利用此漏洞可导致受影响设置重置。 由于HTTP运行在TCP上,要利用此漏洞,恶意通信必须需要在客户端和服务器端进行三次成功的握手之后提交。 此漏洞的Cisco bug ID为CSCsh12480,CVE ID为CVE-2008-3812。 Cisco IOS 12.4XW Cisco IOS 12.4XV Cisco IOS 12.4XK Cisco IOS 12.4XJ Cisco IOS 12.4XE Cisco IOS 12.4(4)T 可参考如下安全公告获得补丁信息: <a href=http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml target=_blank>http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml</a> |
id | SSV:4112 |
last seen | 2017-11-19 |
modified | 2008-09-26 |
published | 2008-09-26 |
reporter | Root |
title | Cisco IOS AIC HTTP传送报文远程拒绝服务漏洞 |
References
- http://secunia.com/advisories/31990
- http://secunia.com/advisories/31990
- http://tools.cisco.com/security/center/viewAlert.x?alertId=16661
- http://tools.cisco.com/security/center/viewAlert.x?alertId=16661
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01545.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01545.shtml
- http://www.securityfocus.com/bid/31354
- http://www.securityfocus.com/bid/31354
- http://www.securitytracker.com/id?1020929
- http://www.securitytracker.com/id?1020929
- http://www.vupen.com/english/advisories/2008/2670
- http://www.vupen.com/english/advisories/2008/2670
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5302
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5302