Korean
<< Back
VID 29065
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS has a filtering bypass vulnerability due to a tacacs-ds or tacacs Access List keyword (CISCO Bug ID CSCdi36962).
Under some circumstances, this vulnerability can be exploited to circumvent a filtering router. If devices using Cisco IOS v10.3 uses IP extended access lists, and the 'tacacs-ds' or 'tacacs' keyword is used in these lists, it can cause an extended IP access control list to be misparsed, possibly allowing unauthorized packets to circumvent a filtering router.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/1.html

* Platforms Affected:
CISCO IOS software 10.3(3.4) through 10.3(4.2)
Recommendation Upgrade to the fixed version of Cisco IOS, 10.3(4.3) or later.

Upgrades should be obtained through the Software Center on Cisco's worldwide website at
http://www.cisco.com/public/sw-center/ .

As a workaround, delete the access list and re-enter it based upon your intended configuration. Do not enter the 'tacacs-ds' keyword. Use the keyword 'tacacs' instead.
Related URL CVE-1999-0161 (CVE)
Related URL 0703 (SecurityFocus)
Related URL 1247 (ISS)