search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco Intrusion Prevention System administration interface fails to properly handle Secure Socket Layer packets

Vulnerability Note VU#642076

Original Release Date: 2006-09-22 | Last Revised: 2006-09-26

Overview

The web administration interface of Cisco Intrusion Prevention System and Intrusion Detection System devices fails to properly handle certain Secure Socket Layer packets. This vulnerability may cause a denial of service.

Description

According to Cisco Security Advisory cisco-sa-20060920-ips:

It is possible to send a malformed SSLv2 Client Hello packet to the IPS/IDS web administration interface, which may cause the process (mainApp) responsible for managing remote access to fail. This results in an IPS/IDS device becoming unresponsive to all future remote management requests through the web administration interface or the command-line interface (CLI) via SSH and the console.
The specific nature of the malformed packets that exploit this vulnerability is unknown. Vulnerable products include Cisco IDS 4.1(x) software prior to 4.1(5c), Cisco IPS 5.0(x) software prior to 5.0(6p1), and Cisco IPS 5.1(x) software prior to 5.1(2).

Impact

A remote, unauthenticated attacker could cause the administrative interface of an affected device to become unavailable, leading to various secondary denial of service impacts.

Solution

Upgrade
Cisco has made fixed versions of the software available to address these vulnerabilities. For more information see Cisco Security Advisory cisco-sa-20060920-ips.

Apply Access Control List


Users that are unable to upgrade should apply an access control list (ACL) on the vulnerable device to restrict access to trusted management systems. Details on creating and uploading an ACL can be found in Cisco's Product Configuration Guide.

Vendor Information

642076
 

Cisco Systems, Inc. Affected

Updated:  September 20, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was reported in Cisco Security Advisory cisco-sa-20060920-ips.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-4910
Severity Metric: 3.66
Date Public: 2006-09-20
Date First Published: 2006-09-22
Date Last Updated: 2006-09-26 16:03 UTC
Document Revision: 22

Sponsored by CISA.