Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote host has software installed that is potentially affected by
multiple vulnerabilities.

Description :

The remote host has a version of Cisco AnyConnect 2.x or 3.x prior to
3.1(3103). It is, therefore, potentially affected by the following
vulnerabilities :

- A heap-based buffer overflow error exists in the file
'ciscod.exe'. (CVE-2013-1173 / CSCud14143)

- An unspecified error exists that could allow local
privilege escalation attacks.
(CVE-2013-1172 / CSCud14153)

Note that these issues affect only hosts with the 'Host Scan' component
deployed.

See also :

http://www.nessus.org/u?301ae033
http://www.nessus.org/u?ffd9a928
http://www.nessus.org/u?78166e60
http://www.nessus.org/u?30cb663c

Solution :

Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(3103) or
later.

Risk factor :

Medium / CVSS Base Score : 6.6
(CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 4.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 66023 ()

Bugtraq ID: 59034
59036

CVE ID: CVE-2013-1172
CVE-2013-1173

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now