Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Moderately critical

Cisco IOS Multiple Vulnerabilities

-

Release Date:  2009-03-26    Views:  10,477

Secunia Advisory SA34438

Where:

From remote

Impact:

Privilege escalation, DoS

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service).

1) An unspecified error in the Cisco Tunneling Control Protocol (cTCP) feature can be exploited to exhaust all memory and may crash the cTCP server via a series of specially crafted TCP packets.

This vulnerability is reported in Cisco IOS versions 12.4(9)T or later, which are configured for Cisco Tunneling Control Protocol (cTCP) encapsulation (disabled by default) for EZVPN server.

2) An unspecified error exists in the handling of IP sockets, which can be exploited to prevent accepting new connections or sessions, exhaust memory, cause high CPU load, or to cause a reload of an affected device.

Successful exploitation of this vulnerability requires a complete TCP three-way handshake to an associated TCP port.

This vulnerability is reported in Cisco IOS and Cisco IOS XE software with the following features enabled:
* Cisco Unified Communications Manager Express
* SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport
* Secure Signaling and Media Encryption
* Blocks Extensible Exchange Protocol (BEEP)
* Network Admission Control HTTP Authentication Proxy
* Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass
* Distributed Director with HTTP Redirects
* DNS (TCP mode only)

3) An unspecified error in Cisco IOS software when being configured for Mobile IP NAT Traversal or Mobile IPv6 can be exploited to stop processing traffic on an interface by sending specially crafted packets to an affected device.

4) An unspecified error in the Cisco IOS SCP server (disabled by default) can be exploited to retrieve or write to arbitrary files on the device's file system, regardless of the CLI view configuration.

Successful exploitation of this vulnerability requires valid user access with an attached command-line interface (CLI) view.

This vulnerability is reported in Cisco IOS software with the SCP server functionality enabled and configured to use role-based ACL access.

5) An unspecified error in the implementation of the Session Initiation Protocol (SIP) can be exploited to reload an affected device via a specially crafted SIP message.

This vulnerability is reported in Cisco IOS with SIP voice services enabled, and which process SIP messages as part of configured VoIP functionality.

6) An unspecified error in the handling of TCP packets can be exploited to reload an affected device via a sequence of specially crafted TCP packets.

Successful exploitation of this vulnerability requires a complete TCP three-way handshake to an associated TCP port.

This vulnerability is reported in Cisco IOS with the following features enabled:
* Airline Product Set (ALPS)
* Serial Tunnel Code (STUN) and Block Serial Tunnel Code (BSTUN)
* Native Client Interface Architecture support (NCIA)
* Data-link switching (DLSw)
* Remote Source-Route Bridging (RSRB)
* Point to Point Tunneling Protocol (PPTP)
* X.25 for Record Boundary Preservation (RBP)
* X.25 over TCP (XOT)
* X.25 Routing

7) An unspecified error in the handling of UDP packets can be exploited to block an interface of an affected device by sending a specially crafted UDP packets.

This vulnerability is reported in Cisco IOS with the following features enabled:
* IP Service Level Agreements (SLA) Responder
* Session Initiation Protocol (SIP)
* H.323 Annex E Call Signaling Transport
* Media Gateway Control Protocol (MGCP)

8) An unspecified error within the Cisco IOS WebVPN and Cisco IOS SSLVPN (SSLVPN) features can be exploited to cause a crash of an affected device via specially crafted HTTPS packets.

9) A memory leak within the Cisco IOS WebVPN and Cisco IOS SSLVPN (SSLVPN) features can be exploited to exhaust memory via SSLVPN sessions.

Vulnerabilities #8 and #9 are reported in Cisco IOS with SSLVPN enabled.


Solution:
Please see the following vendor advisory for fixed versions.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1, 3, 5 - 9) Reported by the vendor.
2) The vendor also credits Jens Link.
4) The vendor credits Kevin Graham.

Original Advisory:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-ip.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-udp.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Cisco IOS Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability