Cisco Security Advisory

Posted: 28/1/11 by komz in Etiquetas: , , ,

A service policy bypass vulnerability exists in the Cisco Content Services Gateway - Second Generation (CSG2), which runs on the Cisco Service and Application Module for IP (SAMI). Under certain configurations this vulnerability could allow:

* Customers to access sites that would normally match a billing policy to be accessed without being charged to the end customer
* Customers to access sites that would normally be denied based on configured restriction policies

Additionally, Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

Cisco Content Services Gateway Vulnerabilities

Workarounds that mitigate these vulnerabilities are not available.

Cisco Security Advisory



0 comentarios: