Vulnerability Note VU#697049

Cisco Secure ACS for Windows CSAdmin vulnerable to buffer overflow via login requests

Original Release date: 05 Jun 2003 | Last revised: 05 Jun 2003

Overview

Cisco Secure ACS for Windows contains a buffer overflow vulnerability that could permit a remote attacker to execute arbitrary code or cause a denial of service.

Description

Cisco Secure ACS for Windows is an authentication, authorization, and accounting (AAA) server. From Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability:

    Cisco Secure ACS for Windows provides a Web-based management interface, termed CSAdmin, which listens on TCP port 2002. A buffer overflow vulnerability occurs during CSAdmin process servicing login requests. Once a sufficiently long user parameter is received by the server, this can cause the buffer overflow, which would typically result in the service hanging until it can be restarted. It is possible that a buffer overflow could be performed that would result in the compromise of the system and permit remote control of the system.

This issue has been assigned Cisco Bug ID CSCea51366.

Impact

A remote attacker could execute arbitrary code with the privileges of the CSAdmin process or cause a denial of service. CSAdmin typically runs with Local System privileges, therefore an attacker could gain complete control of a vulnerable system. The compromise of a Secure ACS system could lead to the disclosure of other user credentials.

Solution

Apply Patch or Upgrade
Apply the appropriate patch as referenced in Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability. As noted in this document, future versions of CSAdmin will include this fix.


Restrict Access to Secure ACS Systems

Restrict access to Secure ACS systems to trusted hosts and networks.

  • Use firewall/router ACLs to limit access to Secure ACS to trusted hosts and networks. Secure ACS provides the ability to restrict access based on IP addresses (see page 10-12 of the User Guide for Cisco Secure ACS for Windows Server).
  • Bind the CSAdmin HTML server to the loopback interface (127.0.0.1) and connect to the Secure ACS host with another secure remote access protocol (Terminal Services/RDP, IPsec, L2TP, SSH).
Note also that SSL can be used to encrypt the HTTP connection to CSAdmin (see page 10-13 of the User Guide for Cisco Secure ACS for Windows Server).

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Cisco Systems Inc.Affected-05 Jun 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by the Cisco Systems Product Security Incident Response Team (PSIRT) and NSFOCUS.

This document was written by Art Manion.

Other Information

  • CVE IDs: CAN-2003-0210
  • Date Public: 23 Apr 2003
  • Date First Published: 05 Jun 2003
  • Date Last Updated: 05 Jun 2003
  • Severity Metric: 6.24
  • Document Revision: 17

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.