Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cisco :: cisco29.htm

Cisco routers reload unexpectedly due to a (exploitable) bug



Vulnerability

    CISCO IOS

Affected

    11.3AA,  12.0  releases:  12.0(2)  up  to  and  including 12.0(6),
    12.0(7), except  that 12.0(7)S,  12.0(7)T, and  12.0(7)XE are  not
    vulnerable

Description

    Following  is  based  on  Cisco  Security  Advisory.   A defect in
    multiple Cisco IOS software versions will cause a Cisco router  to
    reload  unexpectedly  when  the  router  is  tested  for  security
    vulnerabilities  by  security  scanning  software  programs.   The
    defect can be exploited repeatedly to produce a consistent  denial
    of service (DoS) attack.   Customers using the affected Cisco  IOS
    software releases  are urged  to upgrade  as soon  as possible  to
    later versions that are not vulnerable to this defect.  Vulnerable
    products and releases are listed in detail below.

    The security scanner is testing  for the presence of two  specific
    vulnerabilities  that  affect  certain  UNIX-based  systems.   The
    vulnerabilities are unrelated to Cisco IOS software and Cisco  IOS
    software  is  not  directly  at   risk  from  them.   However,   a
    side-effect  of  the  tests  exposes  the defect described in this
    security  advisory,  and  the  router  will reload unexpectedly as
    soon  as  it  receives  any  subsequent  traffic.   This defect is
    documented as Cisco Bug ID CSCdm70743.

    Cisco customers running Cisco  IOS software versions 11.3,  11.3T,
    11.2 or  lower, and  12.0(8) or  12.1 or  higher are not affected.
    This vulnerability affects  the following Cisco  hardware products
    if they are running affected software:

        * AS5200, AS5300, and AS5800 series access servers
        * 7200 and 7500 series routers
        * ubr7200 series cable routers
        * 7100 series routers
        * 3660 series routers
        * SC3640 System Controllers (see the explanation below)
        * AS5800 series Voice Gateway products
        * AccessPath LS-3, TS-3, and VS-3 Access Solutions products

    The SC3640 System Controller is a Cisco 3640 router customized  to
    provide local management  of multiple access  servers.  The  Cisco
    SC3640 binary image contains the defect and thus is vulnerable  if
    it is possible for the attacker to telnet to the device.  However,
    the original Cisco 3640 router does not contain the defect and  is
    not vulnerable to the denial  of service attack described in  this
    notice.    No  other   Cisco  products   are  affected   by   this
    vulnerability.

    Software packages are available  from various commercial and  free
    sites that  perform automated  remote tests  for computer security
    vulnerabilities  by  scanning  computers  on  a  network for known
    security  flaws.   Two  security  vulnerabilities  associated with
    several  UNIX-based  platforms  are  the  subject  of two specific
    tests that have the same effect on vulnerable Cisco routers.   The
    scanning  program  is  asserting  the  Telnet ENVIRON option, #36,
    before the router indicates that  it is willing to accept  it, and
    this causes the router to reload unexpectedly.

    The  described  defect  can  be  used  to  mount  a consistent and
    repeatable denial of service (DoS) attack on any vulnerable  Cisco
    product,  which  may  result  in  violations  of  the availability
    aspects of a  customer's security policy.   This defect by  itself
    does  not  cause  the  disclosure  of confidential information nor
    allow unauthorized access.

Solution

    For the affected  Cisco IOS software  Major Release version  shown
    in the first column of  the table below, customers should  upgrade
    to the  known invulnerable  releases listed  to the  right in  the
    same row.  In general, customers should upgrade to the release  in
    the  column  furthest  to  the  right  within  the  same row.  For
    example,  any  customer  running  12.0  "mainline" (Major Release)
    should upgrade at least  to 12.0(7.1), but preferably  to 12.0(8).
    Any release not specifically listed in the left-most column  below
    is unaffected by the vulnerability.

    The  projected  release  date  is  shown with the software release
    version number  for those  releases that  are not  yet complete or
    available on CCO.*  An "interim release" is scheduled and contains
    numerous fixes and occasional enhancements that carry forward into
    all  later  versions.**  A  "maintenance  release"  is a regularly
    scheduled  event  that  incorporates  significant enhancements and
    cumulative  fixes;  it  may  be  the  entry  point  for support of
    noteworthy new technology in Cisco IOS software.

    ==========================================================================
       Major                          Projected Fixed      Projected Fixed
      Release      Description     Regular or Interim**  Regular Maintenance
                                         Releases              Releases
    ==========================================================================
                           Unaffected Earlier Releases
    --------------------------------------------------------------------------
     11.2 and
     earlier,
        all     Multiple releases       Unaffected            Unaffected
     variants
    ==========================================================================
                               11.3-based Releases
    --------------------------------------------------------------------------
                 AS5800 support
      11.3AA          and                    -               11.3(11a)AA
                   other dial
                    platforms
    ==========================================================================
                               12.0-based Releases
    --------------------------------------------------------------------------
       12.0       12.0 mainline          12.0(7.1)             12.0(8)
    --------------------------------------------------------------------------
                  ISP support:          12.0(6.6)S             12.0(7)S
       12.0S       7200, RSP,      -------------------------------------------
                    GSR12000            12.0(7.1)S             12.0(8)S
    --------------------------------------------------------------------------
      12.0SC        Cable ISP          12.0(6.6)SC1          12.0(8)SC***
                support: ubr7200        12.0(7.1)SC          or 12.0(9)SC
    --------------------------------------------------------------------------
                    12.0 new            12.0(6.5)T3
       12.0T    technology early   ---------------------       12.0(7)T
               deployment release       12.0(6.5)T4
    --------------------------------------------------------------------------
       12.0W    12.0 for Catalyst   12.0(6.5)W5(16.0.9)    12.0(6.5)W5(17),
                 8500 and LS1010                             2000/04/18*
    --------------------------------------------------------------------------
                   Short-life
                   release for
      12.0XE        selected            Unavailable           12.0(7)XE1
                   enterprise
                features, 7200 &
                      7500
    --------------------------------------------------------------------------
                   Short-life
                   release for
      12.0XJ    Dial/Voice, 5200,       Unavailable           12.0(4)XJ4
                5300, 5800, 2600,
                     & 3600
    ==========================================================================
                               12.1-based Releases
    --------------------------------------------------------------------------
     12.1 and
    later, all  Multiple releases       Unaffected            Unaffected
     variants
    ==========================================================================

      * All dates are tentative and subject to change
     ** Interim releases  are subjected to  less internal testing  and
        verification  than  are  regular  releases,  may  have serious
        bugs, and should be installed with great care.
    *** 12.0(8)SC is not vulnerable  to this defect, but due  to other
        issues it is no longer available on CCO as of the date of this
        notice.  Upgrade instead to 12.0(9)SC.

    Cisco  is  offering   free  software  upgrades   to  remedy   this
    vulnerability for all affected customers.  Customers with  service
    contracts may upgrade to any software version.  Customers  without
    contracts  may  upgrade  only  within  a  single  row of the table
    above, except that any  available fixed software will  be provided
    to any customer  who can use  it and for  whom the standard  fixed
    software is  not yet  available.   Customers may  install only the
    feature sets they have purchased.

    The vulnerability described in  this notice can only  be exploited
    if the  Telnet service  is configured  on the  affected system and
    reachable   from   the   attacker's   computer.    The   following
    recommendations provide  an interactive  login capability  without
    using the Telnet service, thus mitigating the threat in lieu of  a
    software upgrade while preserving remote access to the router  for
    administrative purposes:

    * Prevent  access  using  the  Telnet  service  by  defining    an
      appropriate access control list and applying it to the vty  line
      or  the  router's  interfaces  using the "access-group" keyword.
      Security  can  be  increased  further  by  restricting  both the
      virtual  terminal  lines  and  the  router's physical interfaces
      with two access-groups,  one to control  who can connect  to the
      vtys, and  the other  on the  interfaces to  control from  where
      those connections can be attempted.

    * Disable  Telnet  and  use  SSH  (if  it is available to you)  to
      connect  to  the  router  for  administrative  purposes..  After
      "line vty  0 4"  in the  router's configuration,  add "transport
      input ssh".  This stipulates  that only the SSH protocol  may be
      used for interactive logins  to the router.   As of the date  of
      this notice, SSH  is only available  on certain products:  7200,
      7500, and 12000 series running Cisco IOS software releases  such
      as 12.0S, 12.1S, and 12.1T.

    * Disable interactive network  logins to the router  completely by
      removing  the  "line"  command  such  that  virtual consoles are
      never  enabled.   Use  an  out-of-band  method  to  login to and
      administer the router  such as a  hard-wired console.   Consider
      connecting  the  console  to  a  terminal server which itself is
      only reachable via a separate  parallel network that in turn  is
      restricted  by  site   policy  exclusively  for   administrative
      purposes.

    The wide variety of customer configurations make it impossible  to
    judge the effectiveness and  relative merits of these  workarounds
    in  lieu  of  a  software  upgrade.  Customers  are  cautioned  to
    evaluate  these  recommendations  carefully  with  regard to their
    specific network configurations.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH