---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Cisco Service Control Engine SSH Server Denial of Service Vulnerabilities SECUNIA ADVISORY ID: SA30316 VERIFY ADVISORY: http://secunia.com/advisories/30316/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Cisco SCE 1000 Series (Service Control Engine) http://secunia.com/product/18751/ Cisco SCE 2000 Series (Service Control Engine) http://secunia.com/product/18752/ DESCRIPTION: Some vulnerabilities have been reported in Cisco Service Control Engine, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An unspecified error within the SCE SSH server can be exploited to cause system instability or a reload of the SCE via certain SSH login activity. 2) An unspecified error during the login process within the SCE SSH server can be exploited to cause a DoS via specific SSH credentials that attempt to change the authentication method. Vulnerabilities #1 and #2 are reported in the SCE 1000 and 2000 series with software versions prior to 3.1.6. 3) An unspecified error within the SCE SSH server when processing SSH traffic to the SCE management interface can lead to an illegal IO operation and an imperative reboot of the SCE. Vulnerability #3 is reported in the SCE 1000 and 2000 series with software versions prior to 3.0.7 and 3.1.0. Successful exploitation of these vulnerabilities requires that the SSH server is enabled (not enabled by default). SOLUTION: Update to version 3.1.6. http://www.cisco.com/pcgi-bin/tablebuild.pl/scos PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20080521-sce.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------