Overview
The web administration interface of Cisco Intrusion Prevention System and Intrusion Detection System devices fails to properly handle certain Secure Socket Layer packets. This vulnerability may cause a denial of service.
Description
According to Cisco Security Advisory cisco-sa-20060920-ips: It is possible to send a malformed SSLv2 Client Hello packet to the IPS/IDS web administration interface, which may cause the process (mainApp) responsible for managing remote access to fail. This results in an IPS/IDS device becoming unresponsive to all future remote management requests through the web administration interface or the command-line interface (CLI) via SSH and the console. |
Impact
A remote, unauthenticated attacker could cause the administrative interface of an affected device to become unavailable, leading to various secondary denial of service impacts. |
Solution
Upgrade |
Apply Access Control List
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml
- http://secunia.com/advisories/22046/
- http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df9a.html#wp1031536
- http://www.securityfocus.com/bid/20124
- http://secunia.com/advisories/22046
- http://xforce.iss.net/xforce/xfdb/29056
Acknowledgements
This issue was reported in Cisco Security Advisory cisco-sa-20060920-ips.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2006-4910 |
Severity Metric: | 3.66 |
Date Public: | 2006-09-20 |
Date First Published: | 2006-09-22 |
Date Last Updated: | 2006-09-26 16:03 UTC |
Document Revision: | 22 |