Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Access Control Server

Document ID: 61603

Revision 1.1

Last Updated 2004 August 25 1630 UTC (GMT)

For Public Release 2004 August 25 1600 UTC (GMT)


Please provide your feedback on this document.


Contents

Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

Summary

Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) provide authentication, authorization, and accounting (AAA) services to network devices such as a network access server, Cisco PIX and a router. This advisory documents multiple Denial of Service (DoS) and authentication related vulnerabilities for the ACS Windows and the ACS Solution Engine servers.

The vulnerabilities are documented as these Cisco bug IDs:

This advisory will be posted at http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml.

Affected Products

Vulnerable Products

CSCed81716 is only applicable to the ACS Solution Engine.

Successfully authenticate to your ACS box to determine your software revision. After you perform the authentication, the first screen displays the current ACS version in this format—CiscoSecure ACS Release 3.2(3) Build 11.

ACS versions may also be displayed as 003.002(003.011), where "011" is the build number referenced on the ACS graphical user interface (GUI).

Products Confirmed Not Vulnerable

Cisco Secure ACS for UNIX is not affected by these vulnerabilities. No other Cisco products are currently known to be affected by these vulnerabilities.

Details

The Cisco Secure ACS products provide a centralized identity networking solution and simplified user management experience across all Cisco devices and security management applications. The products help to ensure enforcement of assigned policies—they allow network administrators to control who can log into the network, per user privileges in the network, security auditing and billing information, and command level access controls.

Impact

Software Versions and Fixes

DDTs Bug ID

Fixed Versions

Platform

CSCeb60017 ( registered customers only)

003.002(002.020) or later

ACS Windows and ACS Solution Engine

CSCec66913 ( registered customers only)

003.002(002.020) or later

ACS Windows and ACS Solution Engine

CSCec90317 ( registered customers only)

003.002(002.005) or later

ACS Windows and ACS Solution Engine

CSCed81716 ( registered customers only)

003.002(003.011) or later

ACS Solution Engine only

CSCef05950 ( registered customers only)

There are patches available to address this vulnerability. See the Customers with Service Contracts section below for details on the location of these patches.

ACS Windows and ACS Solution Engine

Upgrade procedures can be found as indicated:

Obtaining Fixed Software

Customers with Service Contracts

Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Cisco Product Upgrade Tool at: http://www.cisco.com/upgrade.

Alternatively, Cisco Technical Assistance Center (TAC) can be contacted to get code upgrades for CSCeb60017 ( registered customers only) , CSCec66913 ( registered customers only) , CSCec90317 ( registered customers only) , and CSCed81716 ( registered customers only) . TAC contacts are:

To address CSCef05950 ( registered customers only) , download the patch for your respective versions from:

Public Location:

ACS Windows: http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-acs-win

Registered Users:

ACS Windows: http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-acs-win?psrtdcat20e2

ACS Solution Engine: http://www.cisco.com/pcgi-bin/tablebuild.pl/acs-soleng-3des?psrtdcat20e2

Customers using Third-party Support Organizations

Customers whose Cisco products are provided or maintained through prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers should contact that support organization for assistance with the upgrade, which should be free of charge.

Customers without Service Contracts

Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.

Please have your product serial number available and give the URL of this notice as evidence of your entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.

Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades.

Workarounds

Refer to http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs32/user02/a.htm#wp89030 for information on how to set up an access policy on the Cisco ACS.

Exploitation and Public Announcements

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.

Status of This Notice: FINAL

THIS ADVISORY IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY. YOUR USE OF THE INFORMATION ON THE ADVISORY OR MATERIALS LINKED FROM THE ADVISORY IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS NOTICE AT ANY TIME.

Distribution

This advisory will be posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml.

In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.

Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.

Revision History

Revision 1.1

2004-August-25

Changed URLs in the Obtaining Fixed Software section.

Revision 1.0

2004-August-25

Initial public release.

Cisco Security Procedures

Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.