[LAC-TF] US-CERT Technical Cyber Security Alert TA05-210A -- Cisco IOS IPv6 Vulnerability
Gregorio R. Manzano R.
gmanzano at net-uno.net
Sat Jul 30 22:05:18 BRT 2005
Buenas noches amigos.
Considerando la delicadesa de este caso, es recomendable leer el anexo ASAP.
Saludos cordiales,
Gr. Manzano
Supervisor de Operaciones IP
NOC
netuno
Caracas - VE
National Cyber Alert System
Technical Cyber Security Alert TA05-210A
Cisco IOS IPv6 Vulnerability
Original release date: July 29, 2005
Last revised: --
Source: US-CERT
Systems Affected
* Cisco IOS devices with IPv6 enabled
For specific information, please see the Cisco Advisory.
Overview
Cisco IOS IPv6 processing functionality contains a vulnerability
that
could allow an unauthenticated, remote attacker to execute arbitrary
code or cause a denial of service.
I. Description
Cisco IOS contains a vulnerability in the way IPv6 packets are
processed. US-CERT has not confirmed further technical details.
According to the Cisco Advisory, this vulnerability could be
exploited
by an attacker on the same IP subnet:
Crafted packets from the local segment received on logical
interfaces (that is, tunnels including 6to4 tunnels) as well as
physical interfaces can trigger this vulnerability. Crafted
packets
can not traverse a 6to4 tunnel and attack a box across the tunnel.
The crafted packet must be sent from a local network segment to
trigger the attack. This vulnerability can not be exploited one or
more hops from the IOS device.
US-CERT strongly recommends that sites running Cisco IOS devices
review the Cisco Advisory and upgrade as appropriate. We are
tracking
this vulnerability as VU#930892.
II. Impact
This vulnerability could allow an unauthenticated, remote attacker
on
the same IP subnet to execute arbitrary code or cause a denial of
service. The attacker may be able to take control of a vulnerable
device.
III. Solutions
Upgrade
Upgrade to a fixed version of IOS. Please see the Software Versions
and Fixes section of the Cisco Advisory for details.
Disable IPv6
From the Cisco Advisory:
In networks where IPv6 is not needed, disabling IPv6 processing on
an IOS device will eliminate exposure to this vulnerability. On a
router which supports IPv6, this must be done by issuing the
command "no ipv6 enable" and "no ipv6 address" on each interface.
Appendix A. Vendor Information
Cisco Systems, Inc.
Cisco Systems, Inc. has released a security advisory regarding a
vulnerability which was disclosed on July 27, 2005 at the Black Hat
security conference. Security advisory is available at:
http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml
For up-to-date information on security vulnerabilities in Cisco
Systems, Inc. products, visit http://www.cisco.com/go/psirt.
Appendix B. References
* US-CERT Vulnerability Note VU#930892 -
<http://www.kb.cert.org/vuls/id/930892>
* Cisco Security Advisory: IPv6 Crafted Packet Vulnerability -
<http://www.cisco.com/en/US/products/products_security_advisory091
86a00804d82c9.shtml>
_________________________________________________________________
Information regarding this vulnerability was primarily provided by
Cisco Systems, who in turn acknowledge the disclosure of this
vulnerability at the Black Hat USA 2005 Briefings.
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Send mail to
<cert at cert.org> with "TA05-210A feedback VU#930892" in the subject.
_________________________________________________________________
The most recent version of this document is available at:
<http://www.us-cert.gov/cas/techalerts/TA05-210A.html>
More information about the LACTF
mailing list