CVE-2007-4786

Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and sends them over the network to a remote syslog server or places them in a local logging buffer, which allows context-dependent attackers to obtain sensitive information.
References
Link Resource
http://osvdb.org/37499 Broken Link
http://secunia.com/advisories/26677 Broken Link Third Party Advisory
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/563673 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-74ZK93 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/25548 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018660 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3076 Broken Link Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36473 Third Party Advisory VDB Entry
http://osvdb.org/37499 Broken Link
http://secunia.com/advisories/26677 Broken Link Third Party Advisory
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/563673 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-74ZK93 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/25548 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018660 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3076 Broken Link Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36473 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://osvdb.org/37499 - Broken Link () http://osvdb.org/37499 - Broken Link
References () http://secunia.com/advisories/26677 - Broken Link, Third Party Advisory () http://secunia.com/advisories/26677 - Broken Link, Third Party Advisory
References () http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 - Broken Link, Vendor Advisory () http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 - Broken Link, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/563673 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/563673 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/MIMG-74ZK93 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/MIMG-74ZK93 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/25548 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/25548 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018660 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018660 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/3076 - Broken Link, Third Party Advisory () http://www.vupen.com/english/advisories/2007/3076 - Broken Link, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36473 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/36473 - Third Party Advisory, VDB Entry

25 Jan 2024, 20:59

Type Values Removed Values Added
References (VUPEN) http://www.vupen.com/english/advisories/2007/3076 - Third Party Advisory (VUPEN) http://www.vupen.com/english/advisories/2007/3076 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/26677 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/26677 - Broken Link, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/25548 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/25548 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 - Vendor Advisory (MISC) http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903 - Broken Link, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id?1018660 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id?1018660 - Broken Link, Third Party Advisory, VDB Entry
CWE CWE-255 CWE-319
CVSS v2 : 4.3
v3 : unknown
v2 : 4.3
v3 : 5.3

11 Aug 2023, 19:03

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*

Information

Published : 2007-09-10 21:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4786

Mitre link : CVE-2007-4786

CVE.ORG link : CVE-2007-4786


JSON object : View

Products Affected

cisco

  • adaptive_security_appliance_software
CWE
CWE-319

Cleartext Transmission of Sensitive Information