Vulnerability Note VU#697049
Cisco Secure ACS for Windows CSAdmin vulnerable to buffer overflow via login requests
Cisco Secure ACS for Windows contains a buffer overflow vulnerability that could permit a remote attacker to execute arbitrary code or cause a denial of service.
Cisco Secure ACS for Windows is an authentication, authorization, and accounting (AAA) server. From Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability:
Cisco Secure ACS for Windows provides a Web-based management interface, termed CSAdmin, which listens on TCP port 2002. A buffer overflow vulnerability occurs during CSAdmin process servicing login requests. Once a sufficiently long user parameter is received by the server, this can cause the buffer overflow, which would typically result in the service hanging until it can be restarted. It is possible that a buffer overflow could be performed that would result in the compromise of the system and permit remote control of the system.
A remote attacker could execute arbitrary code with the privileges of the CSAdmin process or cause a denial of service. CSAdmin typically runs with Local System privileges, therefore an attacker could gain complete control of a vulnerable system. The compromise of a Secure ACS system could lead to the disclosure of other user credentials.
Apply Patch or Upgrade
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cisco Systems Inc.||Affected||-||05 Jun 2003|
CVSS Metrics (Learn More)
This vulnerability was reported by the Cisco Systems Product Security Incident Response Team ( PSIRT ) and NSFOCUS .
This document was written by Art Manion.
- CVE IDs: CAN-2003-0210
- Date Public: 23 Apr 2003
- Date First Published: 05 Jun 2003
- Date Last Updated: 05 Jun 2003
- Severity Metric: 6.24
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.