CERT Advisory CA-2002-32 Backdoor in Alcatel OmniSwitch AOS (fwd)

From: Dave Ahmad (daat_private)
Date: Thu Nov 21 2002 - 10:37:14 PST

  • Next message: subversive : "[VulnWatch] SFAD02-002: Calisto Internet Talker Remote DOS"

    David Mirza Ahmad
    Symantec
    
    0x26005712
    8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12
    
    ---------- Forwarded message ----------
    Return-Path: <cert-advisory-ownerat_private>
    Delivered-To: daat_private
    Received: (qmail 24024 invoked by alias); 21 Nov 2002 18:36:26 -0000
    Delivered-To: vulqat_private
    Received: (qmail 24019 invoked from network); 21 Nov 2002 18:36:26 -0000
    Received: from unknown (HELO canaveral.indigo.cert.org) (192.88.209.169)
      by mail.securityfocus.com with SMTP; 21 Nov 2002 18:36:26 -0000
    Received: from localhost (lnchuser@localhost)
    	by canaveral.indigo.cert.org (8.11.6/8.11.6/1.14) with SMTP id
        gALFjiM10306;
    	Thu, 21 Nov 2002 10:45:44 -0500
    Date: Thu, 21 Nov 2002 10:45:44 -0500
    Message-Id: <CA-2002-32.1at_private>
    From: CERT Advisory <cert-advisoryat_private>
    To: cert-advisoryat_private
    Organization: CERT(R) Coordination Center - +1 412-268-7090
    List-Help: <http://www.cert.org/>, <mailto:Majordomoat_private?body=help>
    List-Subscribe: <mailto:Majordomoat_private?body=subscribe%20cert-advisory>
    List-Unsubscribe:
        <mailto:Majordomoat_private?body=unsubscribe%20cert-advisory>
    List-Post: NO (posting not allowed on this list)
    List-Owner: <mailto:cert-advisory-ownerat_private>
    List-Archive: <http://www.cert.org/>
    Subject: CERT Advisory CA-2002-32 Backdoor in Alcatel OmniSwitch AOS
    Precedence: bulk
    
    
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    CERT Advisory CA-2002-32 Backdoor in Alcatel OmniSwitch AOS
    
       Original release date: November 21, 2002
       Last revised: --
       Source: CERT/CC, Alcatel
    
       A complete revision history can be found at the end of this file.
    
    Systems Affected
    
         * Alcatel  OmniSwitch  7700/7800  switches running Alcatel Operating
           System (AOS) version 5.1.1
    
    Overview
    
       Alcatel has recently discovered a serious vulnerability in AOS version
       5.1.1.   Exploitation   of   this   vulnerability  can  lead  to  full
       administrative control of the device running AOS.
    
    I. Description
    
       AOS  typically  runs  on  network  infrastructure devices, such as the
       Alcatel OmniSwitch 7000 series switch. According to Alcatel:
    
         During an NMAP audit of the AOS 5.1.1 code that runs on the Alcatel
         OmniSwitch  7700/7800  LAN  switches,  it  was  determined a telnet
         server  was listening on TCP port number 6778. This was used during
         development to access the Wind River Vx-Works operating system. Due
         to  an  oversight,  this  access  was  not removed prior to product
         release.
    
       Further   information   about  this  vulnerability  may  be  found  in
       VU#181721. This issue is also being referenced as CAN-2002-1272:
    
         http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1272
    
    II. Impact
    
       An  attacker  can  gain  full access to any device running AOS version
       5.1.1,  which  can  result  in,  but  is  not limited to, unauthorized
       access,  unauthorized  monitoring,  information  leakage, or denial of
       service.
    
    III. Solution
    
    Upgrade to AOS 5.1.1.R02 or AOS 5.1.1.R03
    
       Contact Alcatel's customer support for the updated AOS.
    
    Workarounds
    
       Block access to port 6778/TCP at your network perimeter.
    
    Appendix A. - Vendor Information
    
       VU#181721  was  written  by  Alcatel.  As  new  vendor  information is
       reported to the CERT/CC, we will update VU#181721 and note the changes
       in our revision history.
    
    Appendix B. - References
    
        1. VU#181721:   Alcatel  OmniSwitch  7700/7800  does  not  require  a
           password for accessing the telnet server -
           http://www.kb.cert.org/vuls/id/181721
    
        2. OmniSwitch_7000_brief -
           http://www.ind.alcatel.com/nextgen/OmniSwitch_7000_brief.pdf
    
        3. CAN-2002-1272 -
           http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1272
         _________________________________________________________________
    
       We  thank  Olivier  Paridaens  and Jeff Hayes of Alcatel for reporting
       this issue.
         _________________________________________________________________
    
       Author: Ian A. Finlay.
       ______________________________________________________________________
    
       This document is available from:
       http://www.cert.org/advisories/CA-2002-32.html
       ______________________________________________________________________
    
    CERT/CC Contact Information
    
       Email: certat_private
              Phone: +1 412-268-7090 (24-hour hotline)
              Fax: +1 412-268-6989
              Postal address:
              CERT Coordination Center
              Software Engineering Institute
              Carnegie Mellon University
              Pittsburgh PA 15213-3890
              U.S.A.
    
       CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
       EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
       during other hours, on U.S. holidays, and on weekends.
    
    Using encryption
    
       We  strongly  urge you to encrypt sensitive information sent by email.
       Our public PGP key is available from
       http://www.cert.org/CERT_PGP.key
    
       If  you  prefer  to  use  DES,  please  call the CERT hotline for more
       information.
    
    Getting security information
    
       CERT  publications  and  other security information are available from
       our web site
       http://www.cert.org/
    
       To  subscribe  to  the CERT mailing list for advisories and bulletins,
       send  email  to majordomoat_private Please include in the body of your
       message
    
       subscribe cert-advisory
    
       *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
       Patent and Trademark Office.
       ______________________________________________________________________
    
       NO WARRANTY
       Any  material furnished by Carnegie Mellon University and the Software
       Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
       Mellon University makes no warranties of any kind, either expressed or
       implied  as  to  any matter including, but not limited to, warranty of
       fitness  for  a  particular purpose or merchantability, exclusivity or
       results  obtained from use of the material. Carnegie Mellon University
       does  not  make  any warranty of any kind with respect to freedom from
       patent, trademark, or copyright infringement.
         _________________________________________________________________
    
       Conditions for use, disclaimers, and sponsorship information
    
       Copyright 2002 Carnegie Mellon University.
    
       Revision History
    November 21, 2002: Initial release
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.5.8
    
    iQCVAwUBPdz1QmjtSoHZUTs5AQEgCwQA1FMmPs+PRy16ZmVS9RatWwRYU/rHSKsJ
    WteEDnEVZwOe9tcoZ4WB2lN0NICzpz4ioSeUDTdbo8yOTFpBfM+U4S2/7/ZOWaE5
    fBGS3T+9aeecf9t2i1Zavnyr8UNa3MXTo3p4ZC/pBECzSNVxerg7PtHfT8Ee9oLR
    29A2ql3qqA0=
    =pt0A
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Nov 25 2002 - 02:16:14 PST