The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Cisco Security Agent for Linux Port Scan DoS


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 25 Oct 2006 21:12:41 +0200
Subject: [UNIX] Cisco Security Agent for Linux Port Scan DoS
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20061025183807.8764D57EA@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco Security Agent for Linux Port Scan DoS
------------------------------------------------------------------------


SUMMARY

Cisco Security Agent (CSA) for Linux contains a denial of service 
vulnerability involving port scans. By performing a port scan against a 
system running a vulnerable version of CSA, it is possible to cause the 
system to become unresponsive. Cisco Unified CallManager (CUCM) and Cisco 
Unified Presence Server (CUPS) ship with a vulnerable CSA version.

There are workarounds for this vulnerability. Cisco has made free software 
available to address this vulnerability for affected customers.

DETAILS

 Vulnerable Products:
The following CSA versions are vulnerable to the port scanning issue:
 * CSA version 4.5 for Linux (standalone and managed) prior to Hotfix 
4.5.1.657
 * CSA version 5.0 for Linux (standalone and managed) prior to Hotfix 
5.0.0.193

The following Cisco products include a standalone CSA for Linux version 
which are also vulnerable to this issue:
 * Cisco Unified CallManager (CUCM) 5.0 versions including 5.0(4)
 * Cisco Unified Presence Server (CUPS) 1.0 versions including 1.0(2)

Products Confirmed Not Vulnerable:
The following CSA Agent versions are not vulnerable to the port scanning 
issue:
 * CSA version 5.1 (standalone and managed) for Linux
 * All CSA versions (standalone and managed) for Windows
 * All CSA versions (standalone and managed) for Solaris

No other Cisco products are currently known to be affected by this 
vulnerability.

Details:
Cisco Security Agent (CSA) provides threat protection for server and 
desktop computing systems. CSA for Linux is vulnerable to a denial of 
service attack that may be triggered during the identification of network 
port scans. By running a port scan with specific options, it is possible 
to cause excessive system resource consumption resulting in a denial of 
service. It is possible to mitigate this vulnerability by restricting 
network access to vulnerable systems to trusted networks. This issue is 
not a Linux operating system issue. CSA versions for other operating 
systems (Windows, Solaris) are not affected by this vulnerability. This 
issue is documented in Cisco Bug ID CSCse98684  ( registered customers 
only) .

Cisco Unified CallManager 5.0 versions, including 5.0(4), ship with a 
vulnerable version of CSA. A new CallManager Options Package (COP) file is 
available to update the CSA version on CallManager 5.0(4). Future versions 
of CallManager will include the updated CSA version. This issue is 
documented in Cisco Bug ID CSCse97601 ( registered customers only) .

Cisco Unified Presence Server 1.0 versions, including 1.0(2), ship with a 
vulnerable version of CSA. A new COP file is available to update the CSA 
version on CUPS 1.0(2). Future versions of CUPS will include the updated 
CSA version. This issue is documented in Cisco Bug ID CSCsg40052 ( 
registered customers only) .

Impact:
Successful exploitation of the port scan vulnerability against a Linux 
system running a vulnerable version of CSA may cause the system to become 
unresponsive due to resource exhaustion while a port scan is underway. 
This may result in the failure of critical processes and remote network 
connectivity. Repeated port scans may result in a prolonged denial of 
service. If a CUCM or CUPS system running a vulnerable CSA version is 
scanned, voice operations may become unavailable for the duration of the 
port scan.

Workarounds:
It is possible to workaround the Linux port scan vulnerability by 
disabling the Netshield rule in managed agents via the CSA Management 
Center (CSAMC) console (not possible for standalone and CUCM/CUPS agents). 
Administrators should exercise caution when employing this workaround 
because it may open a system to additional network denial of service 
attacks. With the Netshield rule disabled, CSA will still provide 
protection against buffer overflows and other malicious activities.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20061025-csa.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20061025-csa.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру