Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs | vendor advisory |
http://osvdb.org/87251 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79860 | vdb entry |
http://www.securityfocus.com/bid/56433 | vdb entry |
http://secunia.com/advisories/51194 | third party advisory |
http://www.securitytracker.com/id?1027733 | vdb entry |