{"vuid":"VU#5053","idnumber":"5053","name":"Older Versions of Cisco PIX Firewall Manager permits retrieval of files","keywords":["pix firewall manager","cisco"],"overview":"A vulnerability in versions of the Cisco PIX Firewall Manager (PFM) in use circa September 1998 allows intruders to retrieve files from the host running PFM.","clean_desc":"A vulnerability in the Cisco PIx FIrewall manager allows an intruder to retrieve files from the host running PFM. In typical configurations, the intruder would have to be inside the firewall. Quoting from  Cisco Security Notice: Field Notice PIX Firewall Manager File Exposure The Cisco PIX Firewall product is shipped with a management application known as PIX Firewall Manager,  or PFM. PFM is a Worldwide-Web-based application, and includes a limited HTTP server. The PFM HTTP server runs on Windows NT computers. A vulnerability in the PFM HTTP server allows any attacker who can connect to the server to retrieve any file known in advance to exist on the Windows NT host. In almost all cases, this means that the host is vulnerable to attack by any user inside the firewall, but not by users outside the firewall. The use of the PIX Device Manager is preferred to the use of PFM.","impact":"If prerequisites are met, attackers can retrieve any file orfiles on the NT host on which PFM is installed, as well as any file or files on network servers accessible through that host's file system.","resolution":"Use the PIX Device Manager instead of the PIX Firewall Manager (PFM). If that is not possible, upgrade to a version of PFM later than 4.2(1), or the latest version.","workarounds":"","sysaffected":"","thanks":"Our thanks to Cisco for the information in their field notice.","author":"This document was written by Shawn V Hernan.","public":["h","t","t","p",":","/","/","w","w","w",".","c","i","s","c","o",".","c","o","m","/","w","a","r","p","/","p","u","b","l","i","c","/","7","7","0","/","p","i","x","m","g","r","f","i","l","e","-","p","u","b",".","s","h","t","m","l"],"cveids":["CVE-1999-0158"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"1999-01-05T22:40:01Z","publicdate":"1998-08-31T00:00:00Z","datefirstpublished":"2002-01-04T00:47:20Z","dateupdated":"2002-01-04T00:47:23Z","revision":2,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"1","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.63","cam_scorecurrentwidelyknown":"0.63","cam_scorecurrentwidelyknownexploited":"1.23","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.63,"vulnote":null}