code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(103817);
script_version("1.7");
script_cvs_date("Date: 2019/11/12");
script_cve_id("CVE-2017-12246");
script_bugtraq_id(101165);
script_xref(name:"CISCO-BUG-ID", value:"CSCvd59063");
script_xref(name:"CISCO-SA", value:"cisco-sa-20171004-asa");
script_name(english:"Cisco Adaptive Security Appliance Software Direct Authentication Denial of Service Vulnerability");
script_summary(english:"Checks the Cisco Adaptive Security Appliance (ASA) Software version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Adaptive Security Appliance (ASA) Software is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ed9eb8d9");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd59063");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvd59063.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/04");
script_set_attribute(attribute:"patch_publication_date", value:"2017/10/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/12");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/a:cisco:adaptive_security_appliance_software");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
script_require_keys("Host/Cisco/ASA", "Host/Cisco/ASA/model");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco Adaptive Security Appliance (ASA) Software");
version_list = make_list(
"9.4(3)",
"9.7(1)",
"9.8(0.56)"
);
workarounds = make_list(CISCO_WORKAROUNDS['aaa_auth_listener']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCvd59063",
'cmds' , make_list("show running-config | include aaa authentication listener")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|