[NT] Cisco Security Agent Vulnerable to Crafted IP Attack

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.

- - - - - - - - -

Cisco Security Agent Vulnerable to Crafted IP Attack


Cisco Security Agent (CSA) is "a network security software agent that
provides threat protection for server and desktop computing systems".

A malicious attacker may be able to send a crafted IP packet to a Windows
workstation or server running CSA 4.5 which may cause the device to halt
and/or reload. Repeated exploitation will create a sustained DoS (denial
of service).


Vulnerable Systems:
* Cisco CSA version 4.5 when running on any Windows except Windows XP.

Immune Systems:
* Cisco CSA 4.0 and earlier
* Cisco CSA while running on Solaris
* Cisco CSA while running on Linux
* Cisco CSA while running on Windows XP

If a crafted IP packet with certain characteristics are sent to a Windows
platform running CSA 4.5, Windows will halt with a blue screen and system
crash. When exploited, the affected machine will require a reboot to
become operational again.

Successful exploitation of this vulnerability will cause a reload of the
affected machine.

This vulnerability is documented in the Cisco Bug Toolkit as Bug ID

This issue is fixed in CSA maintenance version which is
available for download at:

This issue is also fixed with CSA hotfix version or later which
is available for download at:

There are no recommended workarounds for this vulnerability. Please see
the Obtaining Fixed Software section for appropriate solutions to resolve
this vulnerability.


The information has been provided by <mailto:psirt@xxxxxxxxx> Cisco
Systems Product Security Incident Response Team.
The original article can be found at:


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

Relevant Pages

  • SecurityFocus Microsoft Newsletter #61
    ... Cisco 12000 Series Internet Router Denial Of Service Vulnerability ... Microsoft Windows 2000 RunAs Service Named Pipe Hijacking... ... Reach the LARGEST audience of security professionals with SecurityFocus ...
  • SecurityFocus Microsoft Newsletter #176
    ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
  • SecurityFocus Microsoft Newsletter #242
    ... MICROSOFT VULNERABILITY SUMMARY ... PostNuke Blocks Module Directory Traversal Vulnerability ... Groove Networks Groove Virtual Office COM Object Security By... ... The Microsoft Windows IPV6 TCP/IP stack is prone to a "loopback" condition initiated by sending a TCP packet with the "SYN" flag set and the source address and port spoofed to equal the destination source and port. ...
  • [NT] Cumulative Security Update for Internet Explorer (MS04-025)
    ... Get your security news from a reliable source. ... * Microsoft Windows NT Workstation 4.0 Service Pack 6a ... Navigation Method Cross-Domain Vulnerability ...
  • [NT] Korean Input Method Editor Privileges Elevation (MS06-009)
    ... Get your security news from a reliable source. ... vulnerability exists in the Windows and Office Korean Input Method Editor ... Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service ... If Remote Desktop is manually enabled, ...