Information Security News mailing list archives
Security checks crash Cisco routers
From: InfoSec News <isn () C4I ORG>
Date: Mon, 26 Jun 2000 12:23:33 -0500
http://www.vnunet.com/News/1104718 John Leyden , Monday 26 June 2000 Red-faced networking giant Cisco has been forced to warn customers that its routers can crash when tested for security vulnerabilities by security scanning software programs. The defect, due to a fault in Cisco's IOS (Internet Operating System) software, can be exploited repeatedly to produce a consistent denial of service (DoS) attack, Cisco has admitted. The defect first came to light two months ago but is still an issue in the field, so Cisco has issued a reminder to customers. Cisco customers using the affected IOS software releases - which include 11.3AA, and a number of 12.0 releases up to and including 12.0(6) - are urged to upgrade as soon as possible to later versions, which are not vulnerable to the defect. Richard Stagg, senior security architect at Information Risk Management, said Cisco is blaming security tools when the problem is far wider. "Cisco is obfuscating the fact that its routers have a weakness to denial of service attacks," said Stagg. "The idea that these denial of service attacks can be triggered by security scans is even more embarrassing." The DoS aspect of the flaw was discovered by several different Cisco customers while they were conducting security scans of their networks. However, Cisco said it has still received no reports of malicious exploitation of the flaw. Cisco's advisory states: "The described defect can be used to mount a consistent and repeatable denial of service attack on any vulnerable Cisco product, which may result in violations of the availability aspects of a customer's security policy. This defect by itself does not cause the disclosure of confidential information nor allow unauthorised access." The flaw in IOS is exposed when unspecified security scanners test for the presence of two specific vulnerabilities that affect certain Unix-based systems. These vulnerabilities are unrelated to Cisco IOS software. However, a side effect of the tests means that a router can crash without warning. During the test, the scanning program invokes the Telnet Environ option, #36, before the router is ready to accept it. This causes the router to reset itself unexpectedly. In lieu of a software upgrade, Cisco has also detailed workarounds. These involve setting up an interactive log-in capability without using the Telnet service, thus mitigating the threat. This vulnerability affects a wide range of Cisco's hardware line including series access servers, routers, access products and voice gateway products running vulnerable software. ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Security checks crash Cisco routers InfoSec News (Jun 26)