var-200511-0187
Vulnerability from variot
Unspecified vulnerability in Cisco Security Agent (CSA) 4.5.0 and 4.5.1 agents, when running on Windows systems, allows local users to bypass protections and gain system privileges by executing certain local software. This issue only affects computers running affected versions of Cisco Security Agent on the Microsoft Windows platform. Further details are not currently available, this BID will be updated as information becomes available. Cisco Security Agent adopts behavior-based evaluation criteria to identify and protect servers and terminal computers, instead of relying only on signature matching for analysis and identification, successfully solving the security risks brought by unknown viruses.
The vulnerability is caused due to an unspecified error in CSA on the Windows platform. This can be exploited by malicious users to gain SYSTEM privileges on a vulnerable system.
The vulnerability has been reported in the following versions: * Cisco CSA version 4.5.0 (all builds) managed and standalone agents. * Cisco CSA version 4.5.1 (all builds) managed and standalone agents. * Cisco CSA version 4.5.0 (build 573) for CallManager. * Cisco CSA version 4.5.1 (build 628) for CallManager. * Cisco CSA version 4.5.1 (build 616) for Intelligent Contact Management (ICM), IPCC Enterprise, and IPCC Hosted. * Cisco CSA version 4.5.0 ( build 573) for Cisco Voice Portal (CVP) 3.0 and 3.1.
SOLUTION: Update to version 4.5.1.639.
Management Center for Cisco Security Agents: http://www.cisco.com/pcgi-bin/tablebuild.pl/csa
CSA for CallManager: http://www.cisco.com/pcgi-bin/tablebuild.pl/cmva-3des
CSA for ICM, IPCC Enterprise, and IPCC Hosted: http://www.cisco.com/pcgi-bin/tablebuild.pl/csa10-crypto
CSA for CVP 3.0 and 3.1: http://www.cisco.com/pcgi-bin/tablebuild.pl/csa-cvp-20
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20051129-csa.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200511-0187", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "security agent for ipcc hosted", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.616" }, { "model": "security agent for ipcc enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.616" }, { "model": "security agent for icm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.616" }, { "model": "security agent for cvp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.14.5.1.573" }, { "model": "security agent for cvp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.04.5.1.573" }, { "model": "security agent for callmanager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.628" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "security agent for ipcc hosted", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "security agent for ipcc enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "security agent for icm", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "security agent for cvp", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.14.5.1.639" }, { "model": "security agent for cvp", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.04.5.1.639" }, { "model": "security agent for callmanager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.x" } ], "sources": [ { "db": "BID", "id": "15618" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-461" } ], "trust": 0.6 }, "cve": "CVE-2005-3886", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2005-3886", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-15094", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-3886", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200511-461", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-15094", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-15094" }, { "db": "CNNVD", "id": "CNNVD-200511-461" }, { "db": "NVD", "id": "CVE-2005-3886" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Cisco Security Agent (CSA) 4.5.0 and 4.5.1 agents, when running on Windows systems, allows local users to bypass protections and gain system privileges by executing certain local software. This issue only affects computers running affected versions of Cisco Security Agent on the Microsoft Windows platform. \nFurther details are not currently available, this BID will be updated as information becomes available. Cisco Security Agent adopts behavior-based evaluation criteria to identify and protect servers and terminal computers, instead of relying only on signature matching for analysis and identification, successfully solving the security risks brought by unknown viruses. \n\nThe vulnerability is caused due to an unspecified error in CSA on the\nWindows platform. This can be exploited by malicious users to gain\nSYSTEM privileges on a vulnerable system. \n\nThe vulnerability has been reported in the following versions:\n* Cisco CSA version 4.5.0 (all builds) managed and standalone\nagents. \n* Cisco CSA version 4.5.1 (all builds) managed and standalone\nagents. \n* Cisco CSA version 4.5.0 (build 573) for CallManager. \n* Cisco CSA version 4.5.1 (build 628) for CallManager. \n* Cisco CSA version 4.5.1 (build 616) for Intelligent Contact\nManagement (ICM), IPCC Enterprise, and IPCC Hosted. \n* Cisco CSA version 4.5.0 ( build 573) for Cisco Voice Portal (CVP)\n3.0 and 3.1. \n\nSOLUTION:\nUpdate to version 4.5.1.639. \n\nManagement Center for Cisco Security Agents:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/csa\n\nCSA for CallManager:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/cmva-3des \n\nCSA for ICM, IPCC Enterprise, and IPCC Hosted:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/csa10-crypto\n\nCSA for CVP 3.0 and 3.1:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/csa-cvp-20\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20051129-csa.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-3886" }, { "db": "BID", "id": "15618" }, { "db": "VULHUB", "id": "VHN-15094" }, { "db": "PACKETSTORM", "id": "41894" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "15618", "trust": 2.0 }, { "db": "SECUNIA", "id": "17815", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2005-3886", "trust": 1.7 }, { "db": "SREASON", "id": "224", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2005-2655", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015283", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200511-461", "trust": 0.7 }, { "db": "CISCO", "id": "20051129 CISCO SECURITY AGENT VULNERABLE TO PRIVILEGE ESCALATION", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-15094", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41894", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-15094" }, { "db": "BID", "id": "15618" }, { "db": "PACKETSTORM", "id": "41894" }, { "db": "CNNVD", "id": "CNNVD-200511-461" }, { "db": "NVD", "id": "CVE-2005-3886" } ] }, "id": "VAR-200511-0187", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-15094" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:42.436000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-3886" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20051129-csa.shtml" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/15618" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015283" }, { "trust": 1.7, "url": "http://secunia.com/advisories/17815" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/224" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2005/2655" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2005/2655" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/sw/secursw/ps5057/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/csa10-crypto" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/csa" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17815/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/csa-cvp-20" }, { "trust": 0.1, "url": "http://secunia.com/product/4246/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/cmva-3des" } ], "sources": [ { "db": "VULHUB", "id": "VHN-15094" }, { "db": "BID", "id": "15618" }, { "db": "PACKETSTORM", "id": "41894" }, { "db": "CNNVD", "id": "CNNVD-200511-461" }, { "db": "NVD", "id": "CVE-2005-3886" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-15094" }, { "db": "BID", "id": "15618" }, { "db": "PACKETSTORM", "id": "41894" }, { "db": "CNNVD", "id": "CNNVD-200511-461" }, { "db": "NVD", "id": "CVE-2005-3886" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-29T00:00:00", "db": "VULHUB", "id": "VHN-15094" }, { "date": "2005-11-29T00:00:00", "db": "BID", "id": "15618" }, { "date": "2005-11-30T18:27:13", "db": "PACKETSTORM", "id": "41894" }, { "date": "2005-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-461" }, { "date": "2005-11-29T20:03:00", "db": "NVD", "id": "CVE-2005-3886" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-08T00:00:00", "db": "VULHUB", "id": "VHN-15094" }, { "date": "2005-11-29T00:00:00", "db": "BID", "id": "15618" }, { "date": "2005-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-461" }, { "date": "2024-11-21T00:02:57.240000", "db": "NVD", "id": "CVE-2005-3886" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "15618" }, { "db": "PACKETSTORM", "id": "41894" }, { "db": "CNNVD", "id": "CNNVD-200511-461" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Security Agent Unknown local protection bypass and privilege elevation vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-461" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-461" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.