exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco-CSCsc85405.txt

Cisco-CSCsc85405.txt
Posted Dec 28, 2005
Authored by Clayton Kossmeyer | Site cisco.com

Cisco Securiy Advisory - CSCsc85405 - It was discovered that certain obsolete JSP files may be leveraged to leave the Cisco Clean Access Manager (CAM) open to a denial of service (DoS) attack.

tags | advisory, denial of service
systems | cisco
SHA-256 | ceebaab15d64f2637a4ace5c8a6bd627738557548e49502df9b91156613ef193

Cisco-CSCsc85405.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Cisco Response
==============

This is Cisco PSIRT's response to the statements made by Alex Lanstein
in his message: <DoS in Cisco Clean Access>, posted on 2005-Dec-16, to
the Bugtraq mailing list. An archived version of the report can be
found here:

http://www.securityfocus.com/archive/1/419645/30/0/threaded

We greatly appreciate the opportunity to work with researchers on
security vulnerabilities, and welcome the opportunity to review and
assist in product reports.

Additional Information
======================

This issue is being tracked by Cisco bug ID:


* CSCsc85405 -- Obsolete JSPs can cause a DoS attack on CAM


This DDTS has been resolved and the fix is available.

It was discovered that certain obsolete JSP files may be leveraged to
leave the Cisco Clean Access Manager (CAM) open to a denial of service
(DoS) attack.

The patch is available to customers for download from:

http://www.cisco.com/cgi-bin/tablebuild.pl/cca-patches

The following information is from the README file that accompanies the
patch for CSCsc85405. For more complete information on the issue,
please consult the README.

To address and fix this vulnerability, you must remove the obsolete
JSP files from your CAM as they are no longer needed. You can either:

1. Install the patch on your CAM, as described in "Patch Installation Intructions" below, or

2. Apply the workaround, as described in "Workaround Solution" below.

Caveat CSCsc85405 will be resolved in the following future releases:

* Cisco Clean Access release 3.5(9) and above
* Cisco Clean Access release 3.6.0.1 and above

===============================
Patch Installation Instructions
===============================

To install this patch:

1. Download the Patch-CSCsc85405.tar.gz file from the Cisco Clean
Access Patches folder
(http://www.cisco.com/cgi-bin/tablebuild.pl/cca-patches) under Cisco
Secure Software
(http://www.cisco.com/kobayashi/sw-center/ciscosecure/cleanaccess.shtml).

2. Open an SSH terminal and copy the patch file into your Clean
Access Manager (CAM) using WinSCP, SSH File Transfer or PSCP, as
described below.

If using WinSCP or SSH File Transfer:

a. Copy Patch-CSCsc85405.tar.gz to the /store directory
on the Clean Access Manager.

If using PSCP:

a. Open a command prompt on your Windows computer.

b. Cd to the path where your PSCP resides
(e.g, C:\Documents and Settings\desktop).

c. Enter the following command to copy the file to the CAM:

pscp Patch-CSCsc85405.tar.gz root@ipaddress_manager:/store


3. From the SSH terminal, untar the patch file on the CAM:

cd /store
tar xzvf Patch-CSCsc85405.tar.gz

4. Cd to the Patch-CSCsc85405 directory:

cd Patch-CSCsc85405

5. Execute the patch file upgrade on the CAM:

./patch.sh


=========================
Workaround Solution
=========================

The following workaround steps remove the affected .jsp files from the
CAM, as they are no longer needed.

1. Open an SSH terminal, and login to the CAM shell.

2. Change directory as follows:

cd /perfigo/control/tomcat/webapps/admin/

3. Remove the uploadclient.jsp and ieee8021x.jsp files:

rm -f uploadclient.jsp ieee8021x.jsp

4. Change directory as follows:

cd /perfigo/control/tomcat/work/Standalone/localhost/admin

5. Remove the cached jsp sources:

rm -f uploadclient_jsp.* ieee8021x_jsp.*

6. Remove any file in the "installer/window" directory, this will be
useful for any exploited machine.

rm -f /perfigo/control/tomcat/normal-webapps/installer/windows/*

Cisco Security Procedures
=========================

Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and registering
to receive security information from Cisco, is available on Cisco's
worldwide website at http://www.cisco.com/en/US/products/
products_security_vulnerability_policy.html. This includes instructions
for press inquiries regarding Cisco security notices. All Cisco
security advisories are available at http://www.cisco.com/go/psirt.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (SunOS)

iD8DBQFDqbqrezGozzK2tZARAg5oAKDFImK6FyCWQQhNKaSXGt+8QlqkAwCfcrei
5rYuJ/Qlpqun2NgSd1jTqtI=
=d4PN
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close