Cisco PIX SSH/telnet dDOS vulnerability CSCdy51810

From: Nils Reichen (nreichenat_private)
Date: Tue Nov 05 2002 - 13:20:04 PST

  • Next message: euronymous: "Zeus Admin Server v4.1r2 index.fcgi XSS bug"

    
     ('binary' encoding is not supported, stored as-is)
    Security Advisory 05.11.02: 
    
    Title : Cisco PIX SSH/telnet DOS vulnerability CSCdy51810
    Reporter : Nils Reichen LANexpert SA
    Affected software : PIX OS 6.2.2 (and probably old version)
    Risk : High
    Date : November 5, 2002
    URL: Full description should be posted in few days on
    http://www.giac.org/GCIA.php
    
    [1] Summary
    
    A vulnerability in the TCP/IP stack allow a remote
    attacker run a
    denial of service attack against the PIX firewall.
    
    This vulnerability is due to a wrong handling of the
    subnet address
    by the PIX OS stack. If the SSH or telnet daemon is
    used, the PIX
    will answer to connection request sent to the subnet
    address.
    The use of the subnet address as destination bypass the
    allowed
    other filter. 
    
    DDOS attack exploiting this vulnerability may produce
    memory fragmentation.
    
    
    [2] Affected software
    
    Version 6.2.2 has been confirmed as vulnerable.
    Older versions have not been confirmed, but due to the
    stack level of this vulnerability, they could be
    supposed vulnerable. 
    
    
    [3] Patch
    
    Interim build 6.2.2.111 is available for Cisco
    customer/partner
    through the Cisco Technical Assistance Center
    http://www.cisco.com/tac
    
    
    [4] Testing environments
    
    PIX 515
    OS version 6.2.2
    Only few inside hosts allowed to access the PIX using
    SSH / telnet
    Naptha tool v1.1 from BindView's RAZOR Security Team
    
    
    [5] Required Knowledge
    
    TCP
    PIX firewall
    
    
    [6] Technical Details
    
    The PIX firewall respond to TCP SYN packet sent to the
    subnet address (first IP of the subnet) for SSH and
    telnet service. This behavior is seen if at least one
    inside host is allowed to access the PIX using SSH
    and/or telnet. In this case,
    the TCP three-way handshaking will be completed for any
    external host targeting
    the subnet address.
    
    Test conduced with the Naptha tool v1.1 (from
    BindView's RAZOR team) show the free memory counter
    displayed with the "show memory" decreasing. This test
    was performed by opening
    TCP connections using subnet address as destination and
    never close it.
    The "show memory" command shows the largest contiguous
    free memory.
    
    During the test using one attacker host, the free
    memory shown decreased at 8kbytes/sec.
    
    A DDOS attack may lead to fragment all the free memory.
    
    TCPdump trace:
    07:32:38.409393 151.100.89.67.4268 > MY.NET.97.128.22:
    S 1381191936:1381191936(0) win 32120 <mss
    1460,sackOK,timestamp 542804848[|tcp]> (DF) (ttl 48, id
    33829, len 60)
    07:32:38.409556 MY.NET.97.128.22 > 151.100.89.67.4268:
    S [tcp sum ok] 872965664:872965664(0) ack 1381191937
    win 4096 <mss 1460> (ttl 255, id 6173, len 44)
    07:32:38.452593 151.100.89.67.4268 > MY.NET.97.128.22:
    . [tcp sum ok] 1:1(0) ack 1 win 32120 (DF) (ttl 48, id
    33831, len 40)
    07:32:38.453312 MY.NET.97.254.22 > 151.100.89.67.4268:
    P 872965665:872965684(19) ack 1381191937 win 4096 (ttl
    255, id 6174, len 59)
    07:32:38.497426 151.100.89.67.4268 > MY.NET.97.254.22:
    R [tcp sum ok] 1381191937:1381191937(0) win 0 (ttl 239,
    id 33833, len 40)
    07:32:48.482733 151.100.89.67.4268 > MY.NET.97.128.22:
    F [tcp sum ok] 1:1(0) ack 1 win 32120 (DF) (ttl 48, id
    34171, len 40)
    
    
    
    [7] Exploit Code
    
    Not included in this advisory on purpose
    
    
    [8] Workaround
    
    Filter inbound SSH and telnet traffic targeted to the
    PIX external subnet address
    and interface address on the upstream router.
    
    
    [9] Timeline
    
    Aug 28, 2002	Issue discovered
    Aug 30, 2002	Vendor notified, Cisco Systems PSIRT team
    notified by the TAC
    Sep 03, 2002	Vendor confirmed the issue, bug referenced:
    CSCdy51810
    Sep 04, 2002    IDS Europe mailing list notified
    Sep 13, 2002	New build with fix available
    Nov 05, 2002	Public disclosure on Bugtraq mailing list
    
    
    [10] Correlation  / Vendor status
    No Common Vulnerabilities and Exposures (CVE)
    identification assigned now
    
    Vendor referenced ID for this issue: CSCdy51810
    New OS build with patch released: 6.2.2.111
    
    Vendor don't have plans to issue security advisory,
    vendor PSIRT
    (Product Security Incident Response Team) is
    considering the problem as "unexpected behavior". 
    
    
    [11] Credit
    
    Discovery and exploitation Research:
    Nils Reichen GCIA CCIE#6763
    nreichenat_private
    
    
    [12] Disclaimer
    
    The information within this paper may change without
    notice.
    Use of this information constitutes acceptance for use
    in an AS IS
    condition. There are NO warranties with regard to this
    information.
    In no event shall the author or an entity where he
    belongs be liable
    for any damages whatsoever arising out of or
    in connection with the use or spread of this information.
    Any use of this information is at the user's own risk.
    
    
    [13] Feedback
    
    Please send suggestions, updates, and comments to:
    Nils Reichen LANexpert SA
    http://www.lanexpert.ch/
    Official : nreichenat_private
    



    This archive was generated by hypermail 2b30 : Sat Nov 09 2002 - 09:17:26 PST