8th Feb 2002 [SBWID-5078]
COMMAND
Cisco Secure ACS don\'t fails to apply restrictions set via Novell\'s
NDS
SYSTEMS AFFECTED
Cisco Secure ACS version 3.0.1, configured for NDS
PROBLEM
In Cisco Security Advisory [Cisco Bug ID CSCdw46931] :
[http://www.cisco.com/warp/public/707/ciscosecure-acs-nds-authentication-vuln-pub.shtml]
--snip--
Specific versions of Cisco Secure Authentication Control Server (ACS)
allows authentication of users that have been explicitly disabled or
expired in the Novell Directory Services (NDS).
--snap--
Users who are marked as \"expired\" or \"disabled\" on the NDS database
will still authenticate if their credentials are otherwise correct. The
file \"NDSAuth.DLL\" is a module which allows ACS authentication to be
handled by an external NDS server. Versions of this file with the date
2001-Dec-15 ignore the \"Disabled\" or \"Expired\" state of these users
on NDS. Authentication attempts by users with a Disabled or Expired
status on the NDS server should be refused, but are permitted due to
this vulnerability.
--snip--
SOLUTION
The patch for this vulnerability can be downloaded from the following
location if you are logged in with a valid CCO user account:
http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-acs-win
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH