CVE-2000-1022 : Detail

CVE-2000-1022

4.36%V3
Network
2001-01-22
04h00 +00:00
2005-11-02
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20231

Publication date : 2000-09-18 22h00 +00:00
Author : Lincoln Yeoh
EDB Verified : Yes

source: https://www.securityfocus.com/bid/1698/info Like other firewalls, the Cisco PIX Firewall implements technology that reads the contents of packets passing through it for application-level filtering. In the case of SMTP, it can be configured so only certain smtp commands can be allowed through (for example, dropping extra functionality, such as HELP or commands that could be a security concern, like EXPN or VRFY). When recieving messages, it allows all text through between "data" and "<CR><LF><CR><LF>.<CR><LF>", as this is where the body of the message would normally go and there could be words in it that are smtp commands which shouldn't be filtered. Due to the nature of SMTP and flaws in exceptional condition handling of PIX, it is reportedly possible to evade the smtp command restrictions by tricking the firewall into thinking the body of the message is being sent when it isn't. During communication with an smtp server, if the "data" command is sent before the more important information is sent, such as "rcpt to", the smtp server will return error 503, saying that rcpt was required. The firewall, however, thinks everything is alright and will let everything through until recieving "<CR><LF><CR><LF>.<CR><LF>". It is then possible for the attacker to do whatever he wishes on the email server. Here an example of what i could do exploiting this bug: helo ciao mail from: pinco@pallino.it data ( From here pix disable fixup) expn guest ( Now i could enumerate user vrfy oracle and have access to all command) help whatever command i want quit

Products Mentioned

Configuraton 0

Cisco>>Pix_firewall_software >> Version 4.2\(1\)

Cisco>>Pix_firewall_software >> Version 4.2\(2\)

Cisco>>Pix_firewall_software >> Version 4.2\(5\)

Cisco>>Pix_firewall_software >> Version 4.3

Cisco>>Pix_firewall_software >> Version 4.4\(4\)

Cisco>>Pix_firewall_software >> Version 5.0

Cisco>>Pix_firewall_software >> Version 5.1

Cisco>>Pix_firewall_software >> Version 5.2

References

http://www.securityfocus.com/bid/1698
Tags : vdb-entry, x_refsource_BID