Cisco ASA Bugs Let Remote Users Conduct HTTP Response Splitting and Denial of Service Attacks and Obtain Potentially Sensitive Information
|
|
SecurityTracker Alert ID: 1027008 |
|
SecurityTracker URL: http://securitytracker.com/id/1027008
|
|
CVE Reference:
CVE-2011-3285, CVE-2011-3309, CVE-2011-4006, CVE-2012-0335
(Links to External Site)
|
Date: May 2 2012
|
Impact:
Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): ASA 5500 Series; 7.2 - 8.5
|
Description:
Several vulnerabilities were reported in Cisco ASA. A remote user can cause denial of service conditions. A remote user can conduct HTTP response splitting attacks. A remote user can obtain potentially sensitive information.
A remote user can exploit a CRLF injection flaw in '/+CSCOE+/logon.html' to cause the target server to return a split response [CVE-2011-3285]. A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. Cisco has assigned Bug ID CSCth63101 to this vulnerability. ASA 5500 series devices with software 8.0 through 8.4 are affected.
A remote user can read IKE responder traffic to obtain potentially sensitive information [CVE-2011-3309]. Cisco has assigned Bug ID CSCtt07749 to this vulnerability. ASA 5500 series devices with software 8.2 through 8.4 are affected.
A remote user can exploit a flaw in cut-through proxy authentication processing to obtain potentially sensitive information [CVE-2012-0335]. Cisco has assigned Bug ID CSCtx42746 to this vulnerability. Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 are affected.
A remote user can send specially crafted data to trigger a flaw in the ESMTP inspection feature and cause excessive CPU consumption on the target system [CVE-2011-4006]. Cisco has assigned Bug ID CSCtt32565 to this vulnerability. ASA 5500 series devices with software 8.2 through 8.5 are affected.
|
Impact:
A remote user can cause excessive CPU consumption on the target device.
A remote user can cause arbitrary content to be displayed.
A remote user may be able to poison any intermediate web caches with arbitrary content.
A remote user can obtain potentially sensitive information.
|
Solution:
The vendor has issued a fix.
The vendor's advisories are available at:
http://www.cisco.com/web/software/280775065/37740/ASA-805-Interim-Release-Notes.html
http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html
http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html
http://www.cisco.com/web/software/283878312/88166/ASA-851-Interim-Release-Notes.html
|
Vendor URL: www.cisco.com/ (Links to External Site)
|
Cause:
Access control error, Input validation error
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|