The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco OpenSSL Implementation Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 17 Mar 2004 18:57:29 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NEWS] Cisco OpenSSL Implementation Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco OpenSSL Implementation Vulnerability
------------------------------------------------------------------------


SUMMARY

A new vulnerability in the OpenSSL implementation for SSL has been 
announced on March 17, 2004.

An affected network device running an SSL server based on an affected 
OpenSSL implementation may be vulnerable to a Denial of Service (DoS) 
attack. There are workarounds available to mitigate the effects of this 
vulnerability on Cisco products in the workaround section of this 
advisory. Cisco is providing fixed software, and recommends that customers 
upgrade to it when it is available.

DETAILS

Affected Products:
The following products have their SSL implementation based on the OpenSSL 
code and are affected by this vulnerability.
 * Cisco IOS 12.1(11)E and later in the 12.1E release train. Only crypto 
images (56i and k2) are vulnerable for the Cisco 7100 and 7200 Series 
Routers.
 * Cisco IOS 12.2SY release train. Only crypto images (k8, k9 and k91) are 
vulnerable for the Cisco Catalyst 6500 Series and Cisco 7600 Series 
Routers.
 * Cisco PIX Firewall
 * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 
Series and Cisco 7600 Series routers
 * Cisco MDS 9000 Series Multilayer Switch
 * Cisco Content Service Switch (CSS) 11000 series
 * Cisco Global Site Selector (GSS) 4480
 * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common 
Management Foundation (CMF) version 2.1
 * Cisco Access Registrar (CAR)

The following products have their SSL implementation based on the OpenSSL 
code and are not affected by this vulnerability.
 * Cisco Secure Intrusion Detection System (NetRanger) appliance. This 
includes the IDS-42xx appliances, NM-CIDS and WS-SVS-IDSM2.
 * Cisco SN 5428 and SN 5428-2 Storage Router
 * Cisco CNS Configuration Engine
 * Cisco Network Analysis Modules (NAM) for the Cisco Catalyst 6000 and 
6500 Series switches and Cisco 7600 Series routers
 * Cisco SIP Proxy Server (SPS)
 * CiscoWorks 1105 Hosting Solution Engine (HSE)
 * CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)
 * Cisco Ethernet Subscriber Solution Engine (ESSE)

The following products, which implement SSL, are not affected by this 
vulnerability.
 * Cisco VPN 3000 Series Concentrators

CatOS does not implement SSL and is not vulnerable.

No other Cisco products are currently known to be affected by this 
vulnerability. This vulnerability is still being actively investigated 
across Cisco products and status of some products has still not been 
determined.

Details:
Secure Sockets Layer (SSL), is a protocol used to encrypt the data 
transferred over an TCP session. SSL in Cisco products is mainly used by 
the HyperText Transfer Protocol Secure (HTTPS) web service for which the 
default TCP port is 443. The affected products, listed above, are only 
vulnerable if they have the HTTPS service enabled and the access to the 
service is not limited to trusted hosts or network management 
workstations.

To check if the HTTPS service is enabled one can do the following:
 1. Check the configuration on the device to verify the status of the 
HTTPS service.
 2. Try to connect to the device using a standard web browser that 
supports SSL using a URL similar to https://ip_address_of_device/.
 3. Try and connect to the default HTTPS port, TCP 443, using Telnet. 
telnet ip_address_of_device 443. If the session connects the service is 
enabled and accessible.

Testing by the OpenSSL development team has uncovered a null-pointer 
assignment in the do_change_cipher_spec() function. A remote attacker 
could perform a carefully crafted SSL/TLS handshake against a server that 
used the OpenSSL library in such a way as to cause OpenSSL to crash. This 
crash on many Cisco products would cause the device to reload. Repeated 
exploitation of this vulnerability would result in a Denial of Service 
(DoS) attack on the device.

Another flaw was also discovered in the SSL/TLS handshaking code when 
using Kerberos ciphersuites. A remote attacker could perform a carefully 
crafted SSL/TLS handshake against a server configured to use Kerberos 
ciphersuites in such a way as to cause OpenSSL to crash. None of the Cisco 
OpenSSL implementations are known to use Kerberos ciphersuites and are 
therefore not affected by this second vulnerability.

A third vulnerability described in the NISCC advisory is a bug in older 
versions of OpenSSL, versions before 0.9.6d that can also lead to a Denial 
of Service attack. None of the Cisco OpenSSL implementations are known to 
be affected by this older OpenSSL issue.

More information on the OpenSSL vulnerability is available at  
<http://www.openssl.org/news/secadv_20040317.txt>; 
http://www.openssl.org/news/secadv_20040317.txt.

 * Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2) 
image releases in the 12.1E release train for the Cisco 7100 and 7200 
Series Routers are affected by this vulnerability. All IOS software crypto 
(k8, k9, and k91) image releases in the 12.2SY release train for the Cisco 
Catalyst 6500 Series and Cisco 7600 Series Routers are affected by this 
vulnerability. The SSH implementation in IOS is not dependent on any 
OpenSSL code. SSH implementations in IOS do not handle certificates, yet, 
and therefore do not use any SSL code for SSH. OpenSSL in 12.1E and 12.2SY 
release trains is only used for providing the HTTPS and VPN Device Manager 
(VDM) services. This vulnerability is documented in the Cisco Bug Toolkit 
( registered customers only) as Bug ID CSCee00041. The HTTPS web service, 
that uses the OpenSSL code, on the device is disabled by default. The no 
ip http secure-server command may be used to disable the HTTPS web service 
on the device, if!  required. The SSH and IPSec services in IOS are not 
vulnerable to this vulnerability.


 * Cisco PIX Firewall - PIX 6.x releases are affected by this 
vulnerability. PIX 5.x releases do not contain any SSL code and are not 
vulnerable. This vulnerability is documented in the Cisco Bug Toolkit 
(registered customers only) as Bug ID CSCed90672.


 * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 
Series and Cisco 7600 Series routers - This vulnerability is documented in 
the Cisco Bug Toolkit ( registered customers only) as Bug ID CSCee02055.


 * Cisco MDS 9000 Series Multilayer Switches - This vulnerability is 
documented in the Cisco Bug Toolkit ( registered customers only) as Bug ID 
CSCed96246.


 * Cisco Content Service Switch (CSS) 11000 series - WebNS version 6.x and 
7.x are affected by this vulnerability. WebNS version 5.x is not 
vulnerable to the OpenSSL vulnerabilities. This vulnerability is 
documented in the Cisco Bug Toolkit (registered customers only) as Bug ID 
CSCee01234 for SCM and is documented in the Cisco Bug Toolkit (registered 
customers only) as Bug ID CSCee01240 for the SSL module.


 * Cisco Global Site Selector (GSS) 4480 - This vulnerability is 
documented in the Cisco Bug Toolkit ( registered customers only) as Bug ID 
CSCee01057.


 * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common 
Management Foundation (CMF) version 2.1 - This vulnerability is documented 
in the Cisco Bug Toolkit ( registered customers only) as Bug ID 
CSCsa13748.


 * Cisco Access Registrar (CAR) - This vulnerability is documented in the 
Cisco Bug Toolkit ( registered customers only) as Bug ID CSCee01956.


The Internetworking Terms and Cisco Systems Acronyms online guides can be 
found at  <http://www.cisco.com/univercd/cc/td/doc/cisintwk/>; 
http://www.cisco.com/univercd/cc/td/doc/cisintwk/.

Impact:
An affected network device running an SSL server based on the OpenSSL 
implementation may be vulnerable to a Denial of Service (DoS) attack.

Software Versions and Fixes:
 * Cisco IOS -
      Release - Train - Fixed Releases - Availability
      12.2SY - 12.2(14)SY4 - March 25
      12.1E - 12.1(13)E14 - April 8
      12.1.(19)E7 - April 8
      12.1(20)E3 - April 26

 * Cisco PIX Firewall - The vulnerability is fixed in software releases 
6.0(4)102, 6.1(5)102, 6.2(3)107, and 6.3(3)124. These engineering builds 
may be obtained by contacting the Cisco Technical Assistance Center (TAC). 
TAC Contact information is given in the Obtaining Fixed Software section 
below.


 * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 
Series and Cisco 7600 Series routers - The vulnerability is fixed in 
software release 1.1.3(14) which will be available by Monday, 22 of March, 
2004. This engineering builds may be obtained by contacting the Cisco 
Technical Assistance Center (TAC). TAC Contact information is given in the 
Obtaining Fixed Software section below.


 * Cisco MDS 9000 Series Multilayer Switches - No fixed software release 
or software availability date has been determined yet.


 * Cisco Content Service Switch (CSS) 11000 series -No fixed software 
release or software availability date has been determined yet.


 * Cisco Global Site Selector (GSS) 4480 - No fixed software release or 
software availability date has been determined yet.


 * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common 
Management Foundation (CMF) version 2.1 - No fixed software release or 
software availability date has been determined yet.


 * Cisco Access Registrar (CAR) - The vulnerability is fixed in software 
release 3.5.0.12 which will be available by Friday, 26 of March, 2004.


Obtaining Fixed Software:
Cisco is offering free software upgrades to address this vulnerability for 
all affected customers.

Customers may only install and expect support for the feature sets they 
have purchased. By installing, downloading, accessing or otherwise using 
such software upgrades, Customers agree to be bound by the terms of 
Cisco's software license terms found at  
<http://www.cisco.com/public/sw-license-agreement.html>; 
http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set 
forth at the Cisco Connection Online Software Center at  
<http://www.cisco.com/public/sw-center/sw-usingswc.shtml>; 
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.

Customers with contracts should obtain upgraded software through their 
regular update channels. For most customers, this means that upgrades 
should be obtained through the Software Center on Cisco's worldwide 
website at  <http://www.cisco.com/tacpage/sw-center>; 
http://www.cisco.com/tacpage/sw-center. To access the software download 
URL, you must be a registered user and you must be logged in.

Customers whose Cisco products are provided or maintained through a prior 
or existing agreement with third-party support organizations such as Cisco 
Partners, authorized resellers, or service providers, should contact that 
support organization for assistance with obtaining the software 
upgrade(s).

Customers who purchase direct from Cisco but who do not hold a Cisco 
service contract and customers who purchase through third-party vendors 
but are unsuccessful at obtaining fixed software through their point of 
sale should get their upgrades by contacting the Cisco Technical 
Assistance Center (TAC) using the contact information listed below. In 
these cases, customers are entitled to obtain a free upgrade to a later 
version of the same release or as indicated by the applicable corrected 
software version in the Software Versions and Fixes section (noted above).

Cisco TAC contacts are as follows:

 * +1 800 553 2447 (toll free from within North America)
 * +1 408 526 7209 (toll call from anywhere in the world)
 * e-mail: [email protected]


See  <http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml>; 
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional 
TAC contact information, including special localized telephone numbers and 
instructions and e-mail addresses for use in various languages.

Please have your product serial number available and give the URL of this 
notice as evidence of your entitlement to a upgrade. Upgrades for 
non-contract customers must be requested through the TAC.

Please do not contact either "[email protected]" or 
"[email protected]" for software upgrades.

Workarounds:
The Cisco PSIRT recommends that affected users upgrade to a fixed software 
version of code as soon as it is available.

 * Restrict access to the HTTPS server on the network device. Allow access 
to the network device only from trusted workstations by using access lists 
/ MAC filters that are available on the affected platforms.


 * Disable the SSL server / service on the network device. This workaround 
must be weighed against the need for secure communications with the 
vulnerable device.



ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.

The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру