Vulnerabilities > CVE-2008-3819 - Unspecified vulnerability in Cisco products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
nessus

Summary

dnsserver in Cisco Application Control Engine Global Site Selector (GSS) before 3.0(1) allows remote attackers to cause a denial of service (daemon crash) via a series of crafted DNS requests, aka Bug ID CSCsj70093.

Nessus

NASL familyCISCO
NASL idCISCO-SA-20090107-GSS.NASL
descriptionThe remote Cisco Application Control Engine Global Site Selector (GSS) contains a denial of service (DoS) issue when processing specific Domain Name System (DNS) requests.
last seen2019-10-28
modified2013-07-18
plugin id68961
published2013-07-18
reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/68961
titleCisco Global Site Selector Appliances DNS Vulnerability (cisco-sa-20090107-gss)
code
#TRUSTED 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
#
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(68961);
  script_version("1.9");
  script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");

  script_cve_id("CVE-2008-3819");
  script_bugtraq_id(33152);
  script_xref(name:"CISCO-BUG-ID", value:"CSCsj70093");
  script_xref(name:"IAVT", value:"2009-T-0004");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20090107-gss");

  script_name(english:"Cisco Global Site Selector Appliances DNS Vulnerability (cisco-sa-20090107-gss)");
  script_summary(english:"Checks the GSS version.");

  script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The remote Cisco Application Control Engine Global Site Selector (GSS)
contains a denial of service (DoS) issue when processing specific Domain
Name System (DNS) requests.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090107-gss
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0686f1ca");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090107-gss.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:gss_4480_global_site_selector");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:gss_4490_global_site_selector");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:gss_4491_global_site_selector");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:gss_4492r_global_site_selector");

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/01/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/01/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/18");

  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CISCO");

  script_dependencies("cisco_gss_version.nasl");
  script_require_keys("Host/Cisco/GSS/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
override = 0;
report_extras = "";

model = get_kb_item_or_exit("Host/Cisco/GSS/model");
version = get_kb_item_or_exit("Host/Cisco/GSS/Version");

if ( (model != "4480") && (model != "4490") && (model != "4491") && (model != "4492r") )
  audit(AUDIT_HOST_NOT, "GSS model 4480/4490/4491/4492r");

if ( version =~ "^1\." ) flag++;
if ( version =~ "^2\." ) flag++;

if (flag)
{
  if (get_kb_item("Host/local_checks_enabled"))
  {
    buf = cisco_command_kb_item("Host/Cisco/Config/show_running", "show running");
    if (check_cisco_result(buf))
    {
      if ( (preg(pattern:"cnr enable", multiline:TRUE, string:buf)) && (!preg(pattern:"no cnr enable", multiline:TRUE, string:buf)) )
      {
        flag = 0;
      }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
  }
}

if (flag)
{
  security_warning(port:0, extra:cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 33152 CVE ID:CVE-2008-3819 CNCVE ID:CNCVE-20083819 Cisco Global Site Selector是一款全球服务器网络负载均衡解决方案。 Cisco Global Site Selector处理特殊序列的DNS请求存在问题,远程攻击者可以利用漏洞使GSS的DNS服务崩溃。 当DNS服务器崩溃时,会出现类似如下的日志信息: Dec 18 04:47:21 gss NMR-6-LAUNCHSVR_EXIT[27261] dnsserver' has exited [ExitUnknown(139)]&quot; 漏洞的Cisco Bug ID为CSCsj70093。 Cisco GSS 4492R Global Site Selector 0 Cisco GSS 4492 Global Site Selector 0 Cisco GSS 4491 Global Site Selector 0 Cisco GSS 4490 Global Site Selector Cisco GSS 4480 Global Site Selector Cisco Global Site Selector 4491 1.2 Cisco Global Site Selector 4490 1.2 Cisco Global Site Selector 4480 1.2 厂商解决方案 可参考如下安全公告获得补丁信息: <a href=http://www.cisco.com/warp/public/707/cisco-sa-20090107-gss.shtml target=_blank rel=external nofollow>http://www.cisco.com/warp/public/707/cisco-sa-20090107-gss.shtml</a>
idSSV:4639
last seen2017-11-19
modified2009-01-08
published2009-01-08
reporterRoot
titleCisco Global Site Selector DNS服务器拒绝服务漏洞