Thread-topic: [SA20079] Cisco Application Velocity System Open Relay Security Issue
;-)
>
>
> TITLE:
> Cisco Application Velocity System Open Relay Security Issue
>
> SECUNIA ADVISORY ID:
> SA20079
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/20079/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Security Bypass, Spoofing
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Cisco AVS 3120 Application Velocity System
> http://secunia.com/product/9889/
> Cisco AVS 3110 Application Velocity System
> http://secunia.com/product/9890/
>
> DESCRIPTION:
> A security issue has been reported in Cisco Application Velocity
> System (AVS), which can be exploited by malicious people to use the
> device as an open relay.
>
> The problem is caused due to insecure default settings allowing
> anyone to use the device as an open relay to any TCP service able to
> process data embedded in HTTP POST requests.
>
> The security issue affects the following products:
> * AVS 3110 versions 4.0 and 5.0 (and prior)
> * AVS 3120 version 5.0.0 (and prior)
>
> NOTE: According to Cisco PSIRT, the security issue is actively
> exploited to send unsolicited commercial e-mails and obscure the true
> originator.
>
> SOLUTION:
> Update to version 5.0.1.
>
> Software for AVS 3110:
> http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3110-5.0.1
>
> Software for AVS 3120:
> http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3120-5.0.1
>
> PROVIDED AND/OR DISCOVERED BY:
> Reported by the vendor.
>
> ORIGINAL ADVISORY:
> http://www.cisco.com/warp/public/707/cisco-sa-20060510-avs.shtml
>