Cisco Secure ACS EAP Parsing Vulnerability (cisco-sr-20080903-csacs)

high Nessus Plugin ID 69134

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The version of Cisco Secure Access Control System (ACS) running on the remote host has a memory corruption vulnerability. The length of EAP-Response packets is not properly parsed. Remote code execution could be possible, but has not been confirmed. A remote, unauthenticated attacker could exploit this to execute arbitrary code.

Solution

Upgrade to the relevant Cisco Secure Access Control System version referenced in Cisco Security Response cisco-sr-20080903-csacs.

See Also

http://www.nessus.org/u?5e6f80d4

https://seclists.org/bugtraq/2008/Sep/33

Plugin Details

Severity: High

ID: 69134

File Name: cisco-sr-20080903-csacs.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 7/30/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:cisco:secure_acs

Required KB Items: Host/Cisco/ACS/Version, Host/Cisco/ACS/DisplayVersion

Exploit Ease: No known exploits are available

Patch Publication Date: 9/3/2008

Vulnerability Publication Date: 9/3/2008

Reference Information

CVE: CVE-2008-2441

BID: 30997

CWE: 399

CISCO-SR: cisco-sr-20080903-csacs

CISCO-BUG-ID: CSCsq10103