TACACS+ Denial of Service Vulnerability...

- AV AC AU C I A
发布: 2000-05-30
修订: 2025-04-13

A small buffer overrun exists in the free, unsupported implementation of the tacacs+ server, distributed by Cisco. This vulnerability, while a buffer overrun, appears to not be exploitable due to its short nature. A related vulnerability exists, whereby an attacker can cause the tac_plus server to malloc a large amount of memory, which can potentially result in a denial of service to the machine as a whole. While the analysis of the tacacs+ protocol posted to Bugtraq indicated that clients, including IOS, were vulnerable to the above problems, Cisco claims that IOS clients will reject the packets as invalid, and report an error, without any further problems. Attacking the client requires the ability to perform blind TCP sequencing, and as such is difficult to conduct. The first vulnerability, a buffer overflow, is due to the nature in which the tac_plus server allocates memory for the incoming packet. It will read only up to the length of the header in a primary read, allocate the...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息