The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco IOS Malformed BGP Packet Causes DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 17 Jun 2004 20:30:09 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NEWS] Cisco IOS Malformed BGP Packet Causes DoS

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco IOS Malformed BGP Packet Causes DoS
------------------------------------------------------------------------


SUMMARY

A Cisco device running IOS and enabled for the Border Gateway Protocol 
(BGP) is vulnerable to a Denial of Service (DoS) attack from a malformed 
BGP packet. The BGP protocol is not enabled by default, and must be 
configured in order to accept traffic from an explicitly defined peer. 
Unless the malicious traffic appears to be sourced from a configured, 
trusted peer, it would be difficult to inject a malformed packet.

DETAILS

Vulnerable Systems:
 * Any CISCO device running IOS and configured for BGP routing (versions 
9.x, 10.x, 11.x and 12.x)

A router which is running the BGP process will have a line in the config 
defining the AS number, which can be seen by issuing the command show 
running-config:
router bgp <AS number>

The Border Gateway Protocol (BGP) is a routing protocol defined by RFC 
1771, and designed to manage IP routing in large networks. An affected 
Cisco device running a vulnerable version of Cisco IOS software and 
enabling the BGP protocol will reload when a malformed BGP packet is 
received. BGP runs over TCP, a reliable transport protocol that requires a 
valid three-way handshake before any further messages will be accepted. 
The Cisco IOS implementation of BGP requires the explicit definition of a 
neighbor before a connection can be established, and traffic must appear 
to come from that neighbor. These implementation details make it very 
difficult to send a BGP packet to a Cisco IOS device from an unauthorized 
source.

A Cisco device receiving an invalid BGP packet will reset and may take 
several minutes to become fully functional. This vulnerability may be 
exploited repeatedly resulting in an extended DoS attack.

For software versions and updates, consult the table at  
<http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml which is 
the original CISCO advisory.

Workarounds
Aside for updating the software revision, BGP MD5 authentication can be 
enabled which would protect the vulnerable device. This can be configured 
as shown in the following example:
  router(config)# router bgp
  router(config-router)# neighbor <IP_address> password 
<enter_your_secret_here>

It is necessary to configure the same-shared MD5 secret on both peers and 
at the same time. Failure to do so will break the existing BGP session and 
the new session will not get established until the exact same secret is 
configured on both devices. For a detailed discussion on how to configure 
BGP, refer to the following document:
 
<http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_configuration_guide_chapter09186a00800ca571.html>; http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_configuration_guide_chapter09186a00800ca571.html

Once the secret is configured, it is prudent to change it periodically. 
The exact period must fit within your company security policy but it 
should not be longer than a few months. When changing the secret, again it 
must be done at the same time on both devices. Failure to do so will break 
your existing BGP session. The exception is if your Cisco IOS software 
release contains the integrated CSCdx23494 fix on both sides of the 
connection. With this fix, the BGP session will not be terminated when the 
MD5 secret is changed only on one side. The BGP updates, however, will not 
be processed until either the same secret is configured on both devices or 
the secret is removed from both devices.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру