Korean
<< Back
VID 29046
Severity 20
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco VPN concentrator has a application banner information leakage vulnerability(CISCO Bug ID CSCdu35577). The SSH banner gives out information about the device apart from the SSH version numbers. The FTP banner gives information about the device and the local time. An incorrect HTTP page request gives out information about the device, the name of the person who compiled the software and the time of compilation.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
http://www.ciac.org/ciac/bulletins/m-119.shtml

* Platforms Affected:
Cisco VPN 3000 series concentrator 2.x.x, 3.0.x, 3.1.x, and the earlier than 3.5.4
Recommendation Upgrade to the Cisco VPN 3000 series concentrator version 3.6(Rel) or later, or 3.5.4 or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .

For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml .
Related URL CVE-2002-1094 (CVE)
Related URL 5609,5621,5623,5624 (SecurityFocus)
Related URL 10020 (ISS)