CERTA-2003-AVI-129
Vulnerability from certfr_avis - Published: - Updated:
Le serveur HTTP des systèmes CISCO IOS peut être activé si spécifié dans la configuration. Une vulnérabilité de type débordement de mémoire dans le code permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire sur le système.
Description
Une requête standard GET du protocole HTTP volontairement mal formée permet d'exploiter la vulnérabilité.
Contournement provisoire
Limiter les hôtes ou réseaux autorisés à se connecter au serveur HTTP en créant des ``access lists'' adéquates.
Solution
Se référer au bulletin de sécurité Cisco (cf. section Documentation) pour l'obtention d'un correctif.
Tout système fonctionnant sous CISCO IOS, sauf les versions 12.3 et 12.3T.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eTout syst\u00e8me fonctionnant sous CISCO IOS, sauf les versions 12.3 et 12.3T.\u003c/P\u003e",
"content": "## Description\n\nUne requ\u00eate standard GET du protocole HTTP volontairement mal form\u00e9e\npermet d\u0027exploiter la vuln\u00e9rabilit\u00e9.\n\n## Contournement provisoire\n\nLimiter les h\u00f4tes ou r\u00e9seaux autoris\u00e9s \u00e0 se connecter au serveur HTTP en\ncr\u00e9ant des \\`\\`access lists\u0027\u0027 ad\u00e9quates.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Cisco (cf. section Documentation)\npour l\u0027obtention d\u0027un correctif.\n",
"cves": [],
"links": [],
"reference": "CERTA-2003-AVI-129",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-07-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Le serveur HTTP des syst\u00e8mes CISCO IOS peut \u00eatre activ\u00e9 si sp\u00e9cifi\u00e9 dans\nla configuration. Une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans\nle code permet \u00e0 un utilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du\ncode arbitraire sur le syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9 du serveur HTTP dans CISCO IOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sn-20030730-ios-2gb-get.shtml"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…