Vulnerabilities > CVE-2010-0148 - Unspecified vulnerability in Cisco Security Agent 5.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Unspecified vulnerability in Cisco Security Agent 5.2 before 5.2.0.285, when running on Linux, allows remote attackers to cause a denial of service (kernel panic) via "a series of TCP packets."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Nessus
NASL family CISCO NASL id CISCO_CSA_SA20100217_LINUX_LOCAL.NASL description The version of Cisco Security Agent installed on the remote host is affected by an unspecified denial of service (DoS) vulnerability. A remote, unauthenticated attacker can take advantage of this issue by sending specially crafted TCP packets to the remote host. last seen 2020-06-01 modified 2020-06-02 plugin id 69951 published 2013-09-18 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69951 title Cisco Security Agent 5.2 DoS (cisco-sa-20100217-csa) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(69951); script_version("1.6"); script_cvs_date("Date: 2018/11/15 20:50:20"); script_cve_id("CVE-2010-0148"); script_bugtraq_id(38273); script_xref(name:"CISCO-BUG-ID", value:"CSCtb89870"); script_xref(name:"CISCO-SA", value:"cisco-sa-20100217-csa"); script_name(english:"Cisco Security Agent 5.2 DoS (cisco-sa-20100217-csa)"); script_summary(english:"Checks rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value: "The remote host has an endpoint security application installed that is potentially affected by a denial of service (DoS) vulnerability." ); script_set_attribute( attribute:"description", value: "The version of Cisco Security Agent installed on the remote host is affected by an unspecified denial of service (DoS) vulnerability. A remote, unauthenticated attacker can take advantage of this issue by sending specially crafted TCP packets to the remote host." ); script_set_attribute(attribute:"see_also", value:"https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20100217-csa.html"); script_set_attribute(attribute:"solution", value:"Upgrade to Cisco Security Agent 5.2.0.296 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2010/02/17"); script_set_attribute(attribute:"patch_publication_date", value:"2010/02/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/18"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:security_agent"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release)) release = get_kb_item("Host/CentOS/release"); if (isnull(release)) audit(AUDIT_OS_NOT, "Red Hat or CentOS"); if ("Red Hat" >< release) { os = "RedHat"; rel = "Red Hat"; } else { os = "CentOS"; rel = os; } rpms = get_kb_item("Host/"+os+"/rpm-list"); if (isnull(rpms)) audit(AUDIT_PACKAGE_LIST_MISSING); matches = egrep(pattern:"CSAagent-([0-9\.-]+)",string:rpms); if (!matches) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Cisco Security Agent"); non_vuln = make_list(); foreach match (split(matches, keep:FALSE)) { fix = ''; package = eregmatch(pattern:"(CSAagent)-([0-9\.-]+)",string:match); if(!isnull(package)) { my_rpm = package[0]; ver = package[2]; if ("-" >< ver) ver = ereg_replace(pattern:"-", replace:".", string:ver); # Only Cisco Security Agent release 5.2 is affected by the DoS vuln if (ver =~ "^5\.2\." && ver_compare(ver:ver, fix:"5.2.285") < 0) { fix = "CSAagent-5.2-296"; rpm_report_add(package:my_rpm, reference:"CSAagent-5.2-296"); } else non_vuln = make_list(non_vuln,my_rpm); } } report = rpm_report_get(); if (!isnull(report)) { if (report_verbosity > 0) { security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else { rpm_packages = max_index(non_vuln); if (rpm_packages ==1) audit(AUDIT_PACKAGE_NOT_AFFECTED, non_vuln[0]); else exit(0, "None of the Cisco Security Agent packages (" + join(non_vuln, sep:", ") + ") are affected."); }
NASL family CISCO NASL id CISCO_CSA_MANAGEMENT_CENTER_SA20100217.NASL description According to the version identified on the Management Center for Cisco Agents web interface, the version of Cisco Security Agent installed on the remote host is affected by multiple vulnerabilities : - An unspecified directory traversal vulnerability exists in the Management Center. (CVE-2010-0146) - An unspecified SQL injection vulnerability exists in the Management Center. (CVE-2010-0147) - An unspecified denial of service (DoS) vulnerability exists in Cisco Security Agent release 5.2. Note that Windows and Sun Solaris versions are not affected by this issue. (CVE-2010-0148) last seen 2020-06-01 modified 2020-06-02 plugin id 69952 published 2013-09-18 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/69952 title Multiple Vulnerabilities in Cisco Security Agent (cisco-sa-20100217-csa)
References
- http://osvdb.org/62445
- http://osvdb.org/62445
- http://secunia.com/advisories/38619
- http://secunia.com/advisories/38619
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910d.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910d.shtml
- http://www.securityfocus.com/bid/38273
- http://www.securityfocus.com/bid/38273
- http://www.securitytracker.com/id?1023607
- http://www.securitytracker.com/id?1023607
- http://www.vupen.com/english/advisories/2010/0416
- http://www.vupen.com/english/advisories/2010/0416
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56347
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56347