Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities

medium Nessus Plugin ID 66023

Synopsis

The remote host has software installed that is potentially affected by multiple vulnerabilities.

Description

The remote host has a version of Cisco AnyConnect 2.x or 3.x prior to 3.1(3103). It is, therefore, potentially affected by the following vulnerabilities :

- A heap-based buffer overflow error exists in the file 'ciscod.exe'. (CVE-2013-1173 / CSCud14143)

- An unspecified error exists that could allow local privilege escalation attacks.
(CVE-2013-1172 / CSCud14153)

Note that these issues affect only hosts with the 'Host Scan' component deployed.

Solution

Upgrade to Cisco AnyConnect Secure Mobility Client 3.1(3103) or later.

See Also

http://www.nessus.org/u?7fb36f14

http://www.nessus.org/u?7990b931

http://www.nessus.org/u?78166e60

http://www.nessus.org/u?30cb663c

Plugin Details

Severity: Medium

ID: 66023

File Name: cisco_anyconnect_3_1_3103.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 4/18/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:cisco:anyconnect_secure_mobility_client

Required KB Items: SMB/cisco_anyconnect/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 4/10/2013

Vulnerability Publication Date: 4/10/2013

Reference Information

CVE: CVE-2013-1172, CVE-2013-1173

BID: 59034, 59036

CISCO-BUG-ID: CSCud14143, CSCud14153