安全研究

安全漏洞
Cisco Wireless LAN Controller HTTP配置功能远程代码执行漏洞

发布日期:2013-01-23
更新日期:2013-01-24

受影响系统:
Cisco Wireless LAN Control 7.2
Cisco Wireless LAN Control 7.1
Cisco Wireless LAN Control 7.0
不受影响系统:
Cisco Wireless LAN Control 7.2.103.0
Cisco Wireless LAN Control 7.1.91.0
Cisco Wireless LAN Control 7.0.220.0
描述:
BUGTRAQ  ID: 57524
CVE(CAN) ID: CVE-2013-1104

Cisco WLC 负责全系统的无线LAN功能,例如安全策略、入侵保护、RF管理,服务质量和移动性。

Cisco WLC设备的HTTP配置功能存在远程代码执行漏洞,可允许经过身份验证的远程攻击者通过特制的UserAgent字符串,利用此漏洞在受影响设备上执行任意代码。

设备开启了HTTP Profiling功能时才受该漏洞影响。可以使用show wlan来查看设备是否开启了HTTP Profiling功能。一个示例如下:

--------------------------------------------------------------------

(WLC)>show wlan 3
WLAN Identifier.................................. 3
<output suppressed>
Network Admission Control
  Client Profiling Status ....................... Enabled
   DHCP ......................................... Disabled
   HTTP ......................................... Enabled
<output suppressed>

--------------------------------------------------------------------


<*来源:Cisco
  
  链接:http://seclists.org/fulldisclosure/2013/Jan/208
        http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc
*>

建议:
厂商补丁:

Cisco
-----
Cisco已经为此发布了一个安全公告(cisco-sa-20130123-wlc)以及相应补丁:

cisco-sa-20130123-wlc:Multiple Vulnerabilities in Cisco Wireless LAN Controllers
链接:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc

浏览次数:4263
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障