The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco 11500 Content Services Switch SSL DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 20 Oct 2005 12:00:29 +0200
Subject: [NEWS] Cisco 11500 Content Services Switch SSL DoS
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051020103716.56AC357D4@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco 11500 Content Services Switch SSL DoS
------------------------------------------------------------------------


SUMMARY

"The  <http://www.cisco.com/en/US/products/hw/contnetw/ps792/index.html>; 
Cisco CSS 11500 Series Content Services Switch is a high-performance, 
high-availability modular architecture for Web infrastructures. "

Cisco CSS 11500 Series Content Services Switches (CSS) configured with 
Secure Socket Layer (SSL) termination services are vulnerable to a Denial 
of Service (DoS) attack when processing malformed client certificates.

DETAILS

Vulnerable Systems:
 * Cisco WebNS operating system version 7.1
 * Cisco WebNS operating system version 7.2
 * Cisco WebNS operating system version 7.3
 * Cisco WebNS operating system version 7.4
 * Cisco WebNS operating system version 7.5

Immune Systems:
 * Cisco WebNS operating system version 7.30.4.02
 * Cisco WebNS operating system version 7.40.2.02
 * Cisco WebNS operating system version 7.50.1.03

The Cisco CSS 11500 performs an analysis of protocol headers and directs 
requests to an appropriate resource based on configurable policies. With 
integrated SSL modules.
The CSS may reload due to a memory corruption issue when presented with a 
malformed digital client certificate during the negotiation of a SSL 
session. This condition is present even if the CSS did not request a 
client certificate during SSL session negotiations.
This vulnerability is only present if a CSS is configured to support SSL 
termination services. SSL termination services are not configured by 
default.

Users can determine if SSL termination services are configured on a CSS by 
performing the following steps.

 * View the current running configuration:
          # show running-config


 * In the Services section of the configuration, users can find enabled 
SSL termination services. An example of an enabled SSL termination service 
called ssl-serv1 will look similar to the following. The type command with 
the option ssl-accel or ssl-accel-backend indicates that the service is 
associated with a SSL module, and the active command signifies that a SSL 
termination service is enabled.


        service ssl-serv1
                type ssl-accel
                slot 3
                keepalive type none
                add ssl-proxy-list ssl list1
                active


Successful exploitation of the vulnerability may result in the immediate 
reload of the device. Repeated exploitation could result in a sustained 
DoS attack.

Workarounds:
The effectiveness of any workaround is dependent on specific users 
situations such as product mix, network topology, traffic behavior, and 
organizational mission. Due to the variety of affected products and 
releases, customers should consult with their service provider or support 
organization to ensure any applied workaround is the most
appropriate for use in the intended network before it is deployed.

If upgrading to a fixed version of Cisco WebNS software is not possible, 
the following workarounds are available.

 * Disable SSL termination for network services if not needed.
In service configuration mode, a user can disable a SSL service using the 
following commands. ssl-serv1 is the name of a user defined SSL service.


  (config)# no service ssl-serv1
  Delete service <ssl>, [y/n]:y

 
<http://www.cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_book09186a008027ab4e.html>; Documentation for configuring SSL services on a CSS running Cisco WebNS 7.40.

 
<http://www.cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_book09186a0080405453.html>; Documentation for configuring SSL services on a CSS running Cisco WebNS 7.50.

 * Use Access Control Lists (ACL) on a CSS or network device in front of a 
CSS to restrict access to SSL terminated services to trusted networks.
 
 
<http://www.cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_chapter09186a008029b1db.html#wp1133930> Documentation for configuring an ACL on a CSS running Cisco WebNS 7.40.

 
<http://www.cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_chapter09186a008040aeb9.html#wp1133930> Documentation for configuring an ACL on a CSS running Cisco WebNS 7.50

Vendor Status:
When considering software upgrades, consult  
<http://www.cisco.com/en/US/products/products_security_advisories_listing.html>; http://www.cisco.com/en/US/products/products_security_advisories_listing.html and any subsequent advisories to determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the devices 
to be upgraded contain sufficient memory and that current hardware and 
software configurations will continue to be supported properly by the new 
release. If the information is not clear, contact the Cisco Technical 
Assistance Center ("TAC") for assistance.

 * Cisco WebNS operating system version 7.3 should be upgraded into 
version 7.30.4.02 or newer
 * Cisco WebNS operating system version 7.4 should be upgraded into 
version 7.40.2.02 or newer
 * Cisco WebNS operating system version 7.5 should be upgraded into 
version 7.50.1.03 or newer


Users that running Cisco WebNS 7.10 and 7.20 are encouraged to upgrade CSS 
platforms to a fixed version of Cisco WebNS 7.30 or greater. Fixed 
software may be obtained by registered users at  
<http://www.cisco.com/pcgi-bin/tablebuild.pl/css11500-maint>; 
http://www.cisco.com/pcgi-bin/tablebuild.pl/css11500-maint


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Security Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20051019-css.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20051019-css.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру