Korean
<< Back
VID 29098
Severity 20
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Cisco VPN concentrator gives out too much information in application layer banners.
Cisco VPN 3000 series concentrators running software versions prior to 3.5.4, 3.1.x, 3.0.x, and 2.x.x could allow a remote attacker to obtain sensitive information in the application layer banners. This vulnerability is documented as Cisco bug ID CSCdu35577. An incorrect HTTP page request gives out information about the device, the name of the person who compiled the software and the time of compilation. An attacker could use this information to launch further attacks against the affected device.

* References:
http://www.ciac.org/ciac/bulletins/m-119.shtml
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml

* Platforms Affected:
Cisco Systems, Inc., Cisco VPN 3000 Concentrators 2.x.x
Cisco Systems, Inc., Cisco VPN 3000 Concentrators 3.0.x
Cisco Systems, Inc., Cisco VPN 3000 Concentrators 3.1.x
Cisco Systems, Inc., Cisco VPN 3000 Concentrators prior to 3.5.4
Recommendation Upgrade to the fixed software version of Cisco VPN 3000 (3.6(Rel) or later) or (3.5.4 or later), as listed in "Software Versions and Fixes" of Cisco Security Advisory (Cisco VPN 3000 Concentrator Multiple Vulnerabilities) at http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml .

Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .

For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml .
Related URL CVE-2002-1094 (CVE)
Related URL 5624 (SecurityFocus)
Related URL 10020 (ISS)