Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.0(629) ATL Buffer Overflow

medium Nessus Plugin ID 71464

Synopsis

The remote host has software installed that is affected by a buffer overflow vulnerability.

Description

The remote host has a version of Cisco AnyConnect 2.x or 3.x prior to 3.1(629). As such, when the VPNAPI COM module calls the ATL framework, certain input data are not properly validated and could allow a buffer overflow. This error could lead to arbitrary code execution.

Solution

Upgrade to Cisco AnyConnect Secure Mobility Client 3.0(629) or later.

See Also

https://tools.cisco.com/bugsearch/bug/CSCuj58139

http://www.nessus.org/u?6ff8e198

https://tools.cisco.com/security/center/viewAlert.x?alertId=31606

http://www.nessus.org/u?577a8ca4

Plugin Details

Severity: Medium

ID: 71464

File Name: cisco_anyconnect_3_0_629.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 12/16/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-5559

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/cisco_anyconnect/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 11/4/2013

Vulnerability Publication Date: 11/1/2013

Reference Information

CVE: CVE-2013-5559

BID: 63491

CISCO-BUG-ID: CSCuj58139