Lucene search

K
nessusThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-20080416-NAC.NASL
HistorySep 18, 2013 - 12:00 a.m.

Cisco Network Admission Control Shared Information Disclosure (cisco-sa-20080416-nac)

2013-09-1800:00:00
This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

The remote Cisco Network Admission Control (NAC) is affected by an information disclosure vulnerability. This vulnerability allows an attacker to obtain a shared secret from the error logs, which are sent over the network. This shared secret is used by Cisco Clean Access Server (CAS) and the Cisco Clean Access Manager (CAM). If an attacker is able to obtain this shared secret, they can gain complete control of the remote device.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(69949);
  script_version("1.7");
  script_cvs_date("Date: 2018/11/15 20:50:20");

  script_cve_id("CVE-2008-1155");
  script_bugtraq_id(28807);
  script_xref(name:"CISCO-BUG-ID", value:"CSCsj33976");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20080416-nac");

  script_name(english:"Cisco Network Admission Control Shared Information Disclosure (cisco-sa-20080416-nac)");
  script_summary(english:"Checks the NAC version.");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote device is missing a vendor-supplied security update."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Cisco Network Admission Control (NAC) is affected by an
information disclosure vulnerability. This vulnerability allows an
attacker to obtain a shared secret from the error logs, which are sent
over the network. This shared secret is used by Cisco Clean Access
Server (CAS) and the Cisco Clean Access Manager (CAM). If an attacker
is able to obtain this shared secret, they can gain complete control
of the remote device."
  );
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080416-nac
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2e809bc0");
  script_set_attribute(
    attribute:"solution",
    value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20080416-nac."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(200);

  script_set_attribute(attribute:"vuln_publication_date", value:"2008/04/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2008/04/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:network_admission_control");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CISCO");

  script_dependencies("cisco_nac_version.nasl");
  script_require_keys("Host/Cisco/NAC/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");

version = get_kb_item_or_exit("Host/Cisco/NAC/Version");

flag = 0;
fixed_version = "";

if (version =~ "^3\.5($|\.)")
{
  flag++;
  fixed_version = "upgrade to 3.6.4.4, 4.0.6, or 4.1.2";
}

if ((version =~ "^3\.6($|\.)") && (ver_compare(ver:version, fix:"3.6.4.4", strict:FALSE) == -1))
{
  flag++;
  fixed_version = "3.6.4.4";
}

if ((version =~ "^4\.0($|\.)") && (ver_compare(ver:version, fix:"4.0.6", strict:FALSE) == -1))
{
  flag++;
  fixed_version = "4.0.6";
}

if ((version =~ "^4\.1($|\.)") && (ver_compare(ver:version, fix:"4.1.2", strict:FALSE) == -1))
{
  flag++;
  fixed_version = "4.1.2";
}

if (flag)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fixed_version;
    security_hole(port:0, extra:report);
  }
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
cisconetwork_admission_controlcpe:/a:cisco:network_admission_control
Related for CISCO-SA-20080416-NAC.NASL