Cisco Content Security Management Appliance Telnet Remote Code Execution (cisco-sa-20120126-ironport)

critical Nessus Plugin ID 79272

Synopsis

The remote security appliance is missing a vendor-supplied patch.

Description

According to its self-reported version, the version of AsyncOS running on the remote Cisco Content Security Management Appliance (SMA) is affected by a remote code execution vulnerability due to a buffer overflow condition in the telnet component.

Solution

Apply the relevant update referenced in Cisco Security Advisory cisco-sa-20120126-ironport.

Alternatively, as a workaround, the vendor notes that Telnet services can be disabled on the device.

See Also

http://www.nessus.org/u?a6a6592a

https://tools.cisco.com/bugsearch/bug/CSCzv44580

https://www.freebsd.org/security/advisories/FreeBSD-SA-11:08.telnetd.asc

Plugin Details

Severity: Critical

ID: 79272

File Name: cisco-sa-20120126-sma.nasl

Version: 1.6

Type: local

Family: CISCO

Published: 11/17/2014

Updated: 11/25/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/h:cisco:content_security_management_appliance, cpe:/o:cisco:asyncos

Required KB Items: Host/AsyncOS/Cisco Content Security Management Appliance/DisplayVersion, Host/AsyncOS/Cisco Content Security Management Appliance/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/17/2014

Vulnerability Publication Date: 12/23/2011

Exploitable With

Core Impact

Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)

ExploitHub (EH-11-760)

Reference Information

CVE: CVE-2011-4862

BID: 51182

CISCO-SA: cisco-sa-20120126-ironport

CISCO-BUG-ID: CSCzv44580