Overview
The web administration interface of Cisco Intrusion Prevention System and Intrusion Detection System devices fails to properly handle certain Secure Socket Layer packets. This vulnerability may cause a denial of service.
Description
According to Cisco Security Advisory cisco-sa-20060920-ips: It is possible to send a malformed SSLv2 Client Hello packet to the IPS/IDS web administration interface, which may cause the process (mainApp) responsible for managing remote access to fail. This results in an IPS/IDS device becoming unresponsive to all future remote management requests through the web administration interface or the command-line interface (CLI) via SSH and the console.  | 
Impact
A remote, unauthenticated attacker could cause the administrative interface of an affected device to become unavailable, leading to various secondary denial of service impacts.  | 
Solution
Upgrade  | 
Apply Access Control List 
  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml
 - http://secunia.com/advisories/22046/
 - http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df9a.html#wp1031536
 - http://www.securityfocus.com/bid/20124
 - http://secunia.com/advisories/22046
 - http://xforce.iss.net/xforce/xfdb/29056
 
Acknowledgements
This issue was reported in Cisco Security Advisory cisco-sa-20060920-ips.
This document was written by Chris Taschner.
Other Information
| CVE IDs: | CVE-2006-4910 | 
| Severity Metric: | 3.66 | 
| Date Public: | 2006-09-20 | 
| Date First Published: | 2006-09-22 | 
| Date Last Updated: | 2006-09-26 16:03 UTC | 
| Document Revision: | 22 |