SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Cisco Secure Access Control System Vendors:   Cisco
Cisco Secure Access Control Server for Unix Discloses Files on the System to Remote Users
SecurityTracker Alert ID:  1004676
SecurityTracker URL:  http://securitytracker.com/id/1004676
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 2 2002
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.0 through 2.3.5.1
Description:   Cisco reported a vulnerability in their Cisco Secure Access Control Server for Unix due to an underlying vulnerability in the Acme.serve Java-based web server. A remote user can traverse the directory and view files on the system.

A remote user can reportedly add trailing slashes to a URL to view arbitrary files on the server with the privileges of the server. A demonstration exploit is provided:

http://servername:9090///

Cisco reports that Cisco Secure ACS for Windows NT is not vulnerable.

This vulnerability has been assigned Cisco bug ID CSCdu47965.

The underlying vulnerability in Acme.serve was reported in June 2001 (alert #1001662).

Impact:   A remote user can view files on the system with the privileges of the web server.
Solution:   Cisco has issued a fixed version (2.3.6.1) and has also released patches. The patch instructions are available through the TAC. The patch can be applied for any supported version of Cisco Secure (i.e., CiscoSecure/Unix 2.3(3) or later). The patch consists of the following single file:

FastAdmin/Acme.zip

Cisco has provided the following patch installation instructions.

To install the patch, follow the instructions below. The commands need to be executed on your Cisco Secure ACS Unix by the administrator.

1. Stop Cisco Secure by entering the command:

/etc/rc0.d/K80CiscoSecure

2. Change to the base directory where Cisco Secure is installed.

cd $BASEDIR

3. Copy the compressed tar file Acme-Patch.tar.Z into the current directory.

4. Uncompress and untar the file.

uncompress Acme-Patch.tar.Z
tar xvf Acme-Patch.tar

5. Start Cisco Secure with the command:

/etc/rc2.d/S80CiscoSecure


Cisco has provided the following instructions for obtaining fixed software (see the Vendor URL for the full Cisco advisory):

Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on the Cisco worldwide website at http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-acs.

Customers whose Cisco products are provided or maintained through prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers should contact that support organization for assistance with the upgrade, which should be free of charge.

Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their patch upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows: +1 800 553 2447 (toll-free from within North America) +1 408 526 7209 (toll call from anywhere in the world) or by email: tac@cisco.com

Vendor URL:  www.cisco.com/warp/public/707/acmeweb-acsunix-dirtravers-vuln-pub.shtml (Links to External Site)
Cause:   Input validation error
Underlying OS:  UNIX (Solaris - SunOS)

Message History:   None.


 Source Message Contents

Subject:  Cisco Secure ACS Unix Acme.server Information Disclosure Vulnerability


Security Advisory: Cisco Secure ACS Unix Acme.server Information Disclosure Vulnerability
Revision 1.0
For Public Release 2002 July 2 10:00 (UTC -0800 )
Please provide your feedback on this document.

Contents

      Summary
      Affected Products
      Details
      Impact
      Software Versions and Fixes
      Obtaining Fixed Software
      Workarounds
      Exploitation and Public Announcements
      Status of This Notice
      Distribution
      Revision History
      Cisco Security Procedures

Summary

Cisco Secure Access Control Server for Unix implements the Acme.server and is therefore vulnerable to a directory traversal vulnerability.
  The fix has been included in ACS Unix version 2.3.6.1 which is currently available.

This vulnerability is detailed in Cisco Bug ID CSCdu47965.

This advisory is available at: http://www.cisco.com/warp/public/707/acmeweb-acsunix-dirtravers-vuln-pub.shtml.
Affected Products

The defects described in this document are present in releases beginning with version 2.0 up to and including version 2.3.5.1 of Cisco
 Secure ACS for Unix Server.

Cisco Secure ACS for Windows NT is not vulnerable to this issue.  Cisco Access Registrar is not vulnerable to this issue. 
Details

This vulnerability exists within the Acme.server program that is part of the Cisco Secure ACS Unix installation.  This vulnerability
 has been repaired in the Acme.server utility.  The patch is available for Cisco customers, and has now been incorporated into the
 Cisco Secure ACS Unix product.

The vulnerability is triggered when someone browses to the server URL and adds trailing slashes as in the following example: http://servername:9090///.
 This exploit will display the files and filesystem of the target server.

This vulnerability has been assigned Cisco bug ID CSCdu47965.
Impact

The impact may vary, depending whether potential attackers have access to port 9090 on the Cisco Secure ACS computer. This vulnerability
 could allow an attacker to view files and directory structures on the target system.  Access to the encrypted password file provided
 by this vulnerability, for example, would allow an attacker access through a successful dictionary attack against the listed accounts.

Customers who may have been vulnerable to attack are advised to review privileged accounts and any suspicious database changes, and
 to change administrative passwords.
Software Versions and Fixes

There is a patch available, and the fixes are included in Cisco Secure ACS Unix version 2.3.6.1 and all versions going forward. For
 existing versions, the patch may be applied, which resolves the issue. There is no need to upgrade to a newer version.

Obtaining Fixed Software

Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that
 upgrades should be obtained through the Software Center on the Cisco worldwide website at http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-acs.

Customers whose Cisco products are provided or maintained through prior or existing agreement with third-party support organizations
 such as Cisco Partners, authorized resellers, or service providers should contact that support organization for assistance with the
 upgrade, which should be free of charge.

Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party
 vendors but are unsuccessful at obtaining fixed software through their point of sale should get their patch upgrades by contacting
 the Cisco Technical Assistance Center (TAC). TAC contacts are as follows: +1 800 553 2447 (toll-free from within North America) +1
 408 526 7209 (toll call from anywhere in the world) or by email: tac@cisco.com .

Please have your product serial number available and give the URL of this notice as evidence of your entitlement to the patched software.
 Patch requests for non-contract customers must be requested through the TAC.

Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades or software patches.
Workarounds

Workarounds for this vulnerability include general recommendations of protecting the Cisco Secure ACS for Unix with strong firewalls,
 access controls, and preventing any external or unauthenticated access to the system, and to  port 9090 in particular.  This is an
 interim workaround only, and a patch or upgrade is recommended.

For this issue, a patch is available which may be installed in place of an upgrade.  The patch instructions are available through
 the TAC. This patch fixes the security problem with the Acme.server. It includes the modified files provided by Acme. This patch
 can be applied for any supported version of Cisco Secure, that is, CiscoSecure/Unix 2.3(3) or later. The patch consists of one file:
 FastAdmin/Acme.zip.
Patch Installation Instructions

To install the patch, follow the instructions below. The commands need to be executed on your Cisco Secure ACS Unix by the administrator.

   1. Stop Cisco Secure by entering the command:

/etc/rc0.d/K80CiscoSecure 

   2. Change to the base directory where Cisco Secure is installed.

cd $BASEDIR 

   3. Copy the compressed tar file Acme-Patch.tar.Z into the current directory.

   4. Uncompress and untar the file.

uncompress Acme-Patch.tar.Z
tar xvf Acme-Patch.tar

   5. Start Cisco Secure with the command:

/etc/rc2.d/S80CiscoSecure 

Exploitation and Public Announcements

The issue with the Acme.server was posted to the Bugtraq list June 2001 http://online.securityfocus.com/archive/1/188141 leaving cisco.com
 , although no specific mention of the Cisco product was made in the original posting.  Cisco PSIRT is not aware of any  malicious
 use of the vulnerability described in this advisory.
Status of This Notice: FINAL

This is a final field notice. Although Cisco cannot guarantee the accuracy of all statements in this notice, all the facts have been
 checked to the best of our ability. Cisco does not anticipate issuing updated versions of this notice unless there is some material
 change in the facts. Should there be a significant change in the facts, Cisco may update this notice.
Distribution

This notice will be posted on the Cisco worldwide website at http://www.cisco.com/warp/public/707/acmeweb-acsunix-dirtravers-vuln-pub.shtml.
 In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to
 the following e-mail and Usenet news recipients:

    * cust-security-announce@cisco.com
    * bugtraq@securityfocus.com
    * first-teams@first.org (includes CERT/CC)
    * cisco@spot.colorado.edu
    * comp.dcom.sys.cisco
    * firewalls@lists.gnac.com
    * Various internal Cisco mailing lists

Future updates of this notice, if any, will be placed on Cisco's worldwide web server, but may or may not be actively announced on
 mailing lists or newsgroups. Users concerned about this problem are encouraged to check the URL given above for any updates.
Revision History

Revision 1.0 2002 July 2 - 10:00 (UTC -0800) Initial Public Release
Cisco Security Procedures

Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering
 to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/warp/public/707/sec_incident_response.shtml
 . This includes instructions for press inquiries regarding Cisco security notices. All Cisco Security Advisories are available at
 http://www.cisco.com/go/psirt.

This notice is Copyright 2002 by Cisco Systems, Inc. This notice may be redistributed freely after the release date given at the top
 of the text, provided that redistributed copies are complete and unmodified, and include all date and version information. 


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC