Cisco IOS Firewall Authentication Proxy for FTP and Telnet Sessions Buffer Overflow

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch

Description :

The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet
Sessions feature in specific versions of Cisco IOS software is
vulnerable to a remotely-exploitable buffer overflow condition.
Devices that do not support, or are not configured for Firewall
Authentication Proxy for FTP and/or Telnet Services are not affected.
Devices configured with only Authentication Proxy for HTTP and/or HTTPS
are not affected.
Only devices running certain versions of Cisco IOS are affected.
Cisco has made free software available to address this vulnerability.
There are workarounds available to mitigate the effects of the
vulnerability.

See also :

http://www.nessus.org/u?7779e544
http://www.nessus.org/u?317f31da

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20050907-auth_proxy.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.8
(CVSS2#E:F/RL:W/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 48988 (cisco-sa-20050907-auth.nasl)

Bugtraq ID: 14770

CVE ID: CVE-2005-2841