search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Cisco Secure ACS for Windows CSAdmin vulnerable to buffer overflow via login requests

Vulnerability Note VU#697049

Original Release Date: 2003-06-05 | Last Revised: 2003-06-05

Overview

Cisco Secure ACS for Windows contains a buffer overflow vulnerability that could permit a remote attacker to execute arbitrary code or cause a denial of service.

Description

Cisco Secure ACS for Windows is an authentication, authorization, and accounting (AAA) server. From Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability:

Cisco Secure ACS for Windows provides a Web-based management interface, termed CSAdmin, which listens on TCP port 2002. A buffer overflow vulnerability occurs during CSAdmin process servicing login requests. Once a sufficiently long user parameter is received by the server, this can cause the buffer overflow, which would typically result in the service hanging until it can be restarted. It is possible that a buffer overflow could be performed that would result in the compromise of the system and permit remote control of the system.
This issue has been assigned Cisco Bug ID CSCea51366.

Impact

A remote attacker could execute arbitrary code with the privileges of the CSAdmin process or cause a denial of service. CSAdmin typically runs with Local System privileges, therefore an attacker could gain complete control of a vulnerable system. The compromise of a Secure ACS system could lead to the disclosure of other user credentials.

Solution

Apply Patch or Upgrade
Apply the appropriate patch as referenced in Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability. As noted in this document, future versions of CSAdmin will include this fix.


Restrict Access to Secure ACS Systems

Restrict access to Secure ACS systems to trusted hosts and networks.

    • Use firewall/router ACLs to limit access to Secure ACS to trusted hosts and networks. Secure ACS provides the ability to restrict access based on IP addresses (see page 10-12 of the User Guide for Cisco Secure ACS for Windows Server).
    • Bind the CSAdmin HTML server to the loopback interface (127.0.0.1) and connect to the Secure ACS host with another secure remote access protocol (Terminal Services/RDP, IPsec, L2TP, SSH).
Note also that SSL can be used to encrypt the HTTP connection to CSAdmin (see page 10-13 of the User Guide for Cisco Secure ACS for Windows Server).

Vendor Information

697049
Expand all

Cisco Systems Inc.

Updated:  June 05, 2003

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Cisco Security Advisory: Cisco Secure Access Control Server for Windows Admin Buffer Overflow Vulnerability.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This vulnerability was reported by the Cisco Systems Product Security Incident Response Team ( PSIRT ) and NSFOCUS

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2003-0210
Severity Metric: 6.24
Date Public: 2003-04-23
Date First Published: 2003-06-05
Date Last Updated: 2003-06-05 19:27 UTC
Document Revision: 17

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.