Vulnslist

find the latest Cisco vulnerabilities

Multiple Cisco Products Common Services ActiveMQ Denial of Service Vulnerability

Cisco-SA-20130912-CVE-2013-5488 · Medium · Published · Updated

A vulnerability in the integration of the ActiveMQ component used in products based on Common Services could allow an unauthenticated, remote attacker to consume available memory and cause a denial of service (DoS) condition. The vulnerability is due to improper handling of multiple TCP requests targeting some services. An attacker could exploit this vulnerability by opening several concurrent TCP sessions. A full TCP three-way handshake is needed to exploit this vulnerability. An exploit could allow the attacker to consume available memory, causing some processes to hang or crash. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, it is likely that an attacker would need access to trusted, internal networks in which the targeted device may reside in order to send multiple TCP request to such device. This access requirement limits the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

To mitigate denial of service attacks, apply hardware rate limiter features to limit packets that require CPU processing. See vendor documentation for specific configuration instructions. For hardware rate limiting configuration details, see Cisco Catalyst 6500 Denial of Service (DoS) Protection Configuration Guidehttp://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/configuration/guide/dos.html#wp1141067 .

Administrators are advised to monitor affected systems.

CVEsCVE-2013-5488
Cisco Bug IDsCSCuh01267, CSCuh54766, CSCuh95969, CSCuh95976
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:ND/RC:C
Product Names From Source
Cisco Unified Operations Manager, Cisco Unified Service Monitor, Cisco Security Manager, Cisco Prime LAN Management Solution (LMS)

Related Products

Product CVE Evidence
Cisco Prime LAN Management Solution (LMS) CVE-2013-5488 Cisco OpenVuln
Cisco Security Manager CVE-2013-5488 Cisco OpenVuln
Cisco Unified Operations Manager CVE-2013-5488 Cisco OpenVuln
Cisco Unified Service Monitor CVE-2013-5488 Cisco OpenVuln