From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 15 Jan 2006 19:04:47 +0200
Subject: [NT] Cisco Security Agent Vulnerable to Crafted IP Attack
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060116095841.4D44E573C@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Cisco Security Agent Vulnerable to Crafted IP Attack
------------------------------------------------------------------------
SUMMARY
Cisco Security Agent (CSA) is "a network security software agent that
provides threat protection for server and desktop computing systems".
A malicious attacker may be able to send a crafted IP packet to a Windows
workstation or server running CSA 4.5 which may cause the device to halt
and/or reload. Repeated exploitation will create a sustained DoS (denial
of service).
DETAILS
Vulnerable Systems:
* Cisco CSA version 4.5 when running on any Windows except Windows XP.
Immune Systems:
* Cisco CSA 4.0 and earlier
* Cisco CSA while running on Solaris
* Cisco CSA while running on Linux
* Cisco CSA while running on Windows XP
If a crafted IP packet with certain characteristics are sent to a Windows
platform running CSA 4.5, Windows will halt with a blue screen and system
crash. When exploited, the affected machine will require a reboot to
become operational again.
Successful exploitation of this vulnerability will cause a reload of the
affected machine.
This vulnerability is documented in the Cisco Bug Toolkit as Bug ID
CSCsa85175
This issue is fixed in CSA maintenance version 4.5.1.616 which is
available for download at:
<http://www.cisco.com/cgi-bin/tablebuild.pl/csa.>
http://www.cisco.com/cgi-bin/tablebuild.pl/csa.
This issue is also fixed with CSA hotfix version 4.5.0.573 or later which
is available for download at:
<http://www.cisco.com/cgi-bin/tablebuild.pl/csahf-crypto>
http://www.cisco.com/cgi-bin/tablebuild.pl/csahf-crypto
Workarounds:
There are no recommended workarounds for this vulnerability. Please see
the Obtaining Fixed Software section for appropriate solutions to resolve
this vulnerability.
ADDITIONAL INFORMATION
The information has been provided by <mailto:psirt@cisco.com.> Cisco
Systems Product Security Incident Response Team.
The original article can be found at:
<http://www.cisco.com/warp/public/707/cisco-sa-20050713-csa.shtml>
http://www.cisco.com/warp/public/707/cisco-sa-20050713-csa.shtml
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.