|
|
|
|
| |
Credit:
The information has been provided by Cisco Systems Product Security Incident Response Team.
The original article can be found at: http://www.cisco.com/warp/public/707/cisco-sa-20080618-ips.shtml
|
| |
Vulnerable Systems:
* Cisco Intrusion Prevention System version 5.x prior to 5.1(8)E2
* Cisco Intrusion Prevention System version 6.x prior to 6.0(5)E2
The following Cisco IPS platforms ship with gigabit network interfaces and are vulnerable if they are deployed in inline mode:
* 4235
* 4240
* 4250
* 4250SX *
* 4250TX
* 4250XL *
* 4255
* 4260
* 4270
* The 4250SX and 4250XL models ship with gigabit network interfaces that are normally used for remote administration and monitoring. If the gigabit network interfaces are configured for use with inline mode, the platform is vulnerable.
To determine the version of software that is running on a Cisco IPS platform, log into the platform using the console or Secure Shell (SSH) and issue the show version command.
sensor# show version
Application Partition:
Cisco Intrusion Prevention System, Version 6.0(4a)E1
To determine whether a Cisco IPS platform has interfaces configured for inline mode, log into the platform using the console or SSH and issue the show interfaces command. Look for paired interfaces in the Inline Mode statement of the command output.
sensor# show interfaces
...
MAC statistics from interface GigabitEthernet0/1
Interface function = Sensing interface
Description =
Media Type = TX
Missed Packet Percentage = 0
Inline Mode = Paired with interface GigabitEthernet0/0
...
MAC statistics from interface GigabitEthernet0/0
Interface function = Sensing interface
Description =
Media Type = TX
Missed Packet Percentage = 0
Inline Mode = Paired with interface GigabitEthernet0/1
Immune Systems:
The following Cisco IPS platforms are not vulnerable:
* 4210
* 4215
* SSM-AIP10
* SSM-AIP20
* SSM-AIP40
* AIM-IPS
* NM-CIDS
* IDSM2
Cisco IPS version 6.1(1) is not vulnerable. Cisco IOS with the Intrusion Prevention System feature is not vulnerable. No other Cisco products are currently known to be affected by this vulnerability.
Details:
Certain Cisco IPS platforms contain a denial of service vulnerability in the handling of jumbo ethernet frames. When a specific series of jumbo Ethernet frames is received on a gigabit network interface of a vulnerable Cisco IPS platform that is deployed in inline mode, a kernel panic may occur that results in the complete failure of the platform and causes a network denial of service condition. Cisco IPS platforms that are deployed in promiscuous mode only or that do not contain gigabit network interfaces are not vulnerable.
Jumbo Ethernet support is usually deployed in data center environments to increase inter-server communication performance and is not a default configuration for Cisco routers and switches. Support for jumbo Ethernet frames must be enabled on each device that require the feature. In order to exploit this vulnerability, an attacker must be able to inject jumbo Ethernet frames to a vulnerable Cisco IPS platform that is deployed in inline mode.
If they are configured to use bypass mode to allow traffic to pass in the event of a system failure, all Cisco IPS platforms will fail to forward traffic except for the 4260 and 4270 platforms. The Cisco IPS 4260 and 4270 platforms contain a hardware bypass feature that allows them to pass network traffic in the event of a kernel panic or power outage. They will pass traffic by default if the hardware bypass feature is engaged.
CVE Information:
CVE-2008-2060
Impact:
Successful exploitation of the vulnerability may result in a network denial of service condition. A power cycle is required to recover operation. An attacker may be able to evade access controls and detection of malicious activity in the case of Cisco IPS 4260/4270 platforms that have hardware bypass configured to pass traffic in the event of a kernel panic.
Workarounds:
To workaround this vulnerability, administrators can disable jumbo Ethernet support on routers and switches directly that are connected to vulnerable Cisco IPS platforms. This workaround may produce a negative performance impact in certain environments. Administrators are encouraged to upgrade to fixed software.
For more information about configuring Jumbo frames on Cisco switches, please reference the following link:
http://www.cisco.com/en/US/products/hw/switches/ps700/products_configuration_example09186a008010edab.shtml
|
|
|
|
|