Thread-topic: [SA20079] Cisco Application Velocity System Open Relay Security Issue
;-)
>
>
> TITLE:
> Cisco Application Velocity System Open Relay Security Issue
>
> SECUNIA ADVISORY ID:
> SA20079
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Security Bypass, Spoofing
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Cisco AVS 3120 Application Velocity System
>
> Cisco AVS 3110 Application Velocity System
>
>
> DESCRIPTION:
> A security issue has been reported in Cisco Application Velocity
> System (AVS), which can be exploited by malicious people to use the
> device as an open relay.
>
> The problem is caused due to insecure default settings allowing
> anyone to use the device as an open relay to any TCP service able to
> process data embedded in HTTP POST requests.
>
> The security issue affects the following products:
> * AVS 3110 versions 4.0 and 5.0 (and prior)
> * AVS 3120 version 5.0.0 (and prior)
>
> NOTE: According to Cisco PSIRT, the security issue is actively
> exploited to send unsolicited commercial e-mails and obscure the true
> originator.
>
> SOLUTION:
> Update to version 5.0.1.
>
> Software for AVS 3110:
>
>
> Software for AVS 3120:
>
>
> PROVIDED AND/OR DISCOVERED BY:
> Reported by the vendor.
>
> ORIGINAL ADVISORY:
>
>