Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Wireless LAN Controllers, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
7058212fa120fb3b92218b90406e394f7d1610848852fa1e5b0e0f471645f35e
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Cisco Wireless LAN Controllers Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA35982
VERIFY ADVISORY:
http://secunia.com/advisories/35982/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco Wireless LAN
Controllers, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.
1) An error in the processing of HTTP Basic authentication requests
can be exploited to cause the device to reload by sending a specially
crafted request containing overly long authentication data to the
administrative web interface.
2) A memory leak in the handling of SSH management connections can be
exploited to cause a crash and reload an affected device.
Successful exploitation does not require a three-way handshake.
3) An unspecified error in the processing of requests sent to the
administrative web interface can be exploited to cause a crash and
reload an affected device.
4) An error in the processing of HTTP and HTTPS requests can be
exploited to modify the configuration of an affected device via
specially crafted requests sent to an IP address that is bound to an
administrative interface or VLAN.
Successful exploitation of this vulnerability allows to gain full
control of the device.
SOLUTION:
Update to the latest versions (see vendor advisories for details).
PROVIDED AND/OR DISCOVERED BY:
1) Christoph Bott
3) The vendor credits IBM Research.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20090727-wlc.shtml
Christoph Bott:
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0407.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------