Cisco ASA VPN Denial of Service (CSCua91108)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A vulnerability in the VPN authentication code that handles parsing of
the username from the certificate on the Cisco ASA firewall could allow
an unauthenticated, remote attacker to cause a reload of the affected
device.

The vulnerability is due to parallel processing of a large number of
Internet Key Exchange (IKE) requests for which username-from-cert is
configured. An attacker could exploit this vulnerability by sending a
large number of IKE requests when the affected device is configured with
the username-from-cert command. An exploit could allow the attacker to
cause a reload of the affected device, leading to a denial of service
(DoS) condition.

See also :

http://www.nessus.org/u?2b6bddb6

Solution :

Apply the relevant patch referenced in Cisco Bug Id CSCua91108.

Risk factor :

Medium / CVSS Base Score : 5.4
(CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 4.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 72485 ()

Bugtraq ID: 63262

CVE ID: CVE-2013-5544