Korean
<< Back
VID 29033
Severity 30
Port 161
Protocol UDP
Class CISCO
Detailed Description The CISCO VPN concentrator has a VPN client authentication vulnerability (Cisco bug ID CSCdx39981). This vulnerability can be exploited to initiate a DOS attack.
When using a VPN client it is possible to cause the Cisco VPN 3000 series concentrator to reload by responding with a very large string for the username prompt.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml

* Platforms Affected:
Cisco VPN 3000 series concentrator: 3.6(Rel), earlier than 3.5.5, 3.1.x, 3.0.x, 2.x.x
Recommendation Upgrade to the Cisco VPN 3000 series concentrator version 3.5.5 or later, and 3.6.1 or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .

For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)