The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco IPS MC Malformed Configuration Download Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 2 Nov 2005 09:30:56 +0200
Subject: [NEWS] Cisco IPS MC Malformed Configuration Download Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051102084743.81F2757A6@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco IPS MC Malformed Configuration Download Vulnerability
------------------------------------------------------------------------


SUMMARY

The CiscoWorks VPN/Security Management Solution (VMS) is a network 
management application that includes Web-based tools for configuring, 
monitoring, and troubleshooting VPNs, firewalls, network intrusion 
detection systems (NIDSs), network intrusion prevention systems (NIPSs) 
and host intrusion prevention systems (HIPSs). CiscoWorks VMS also 
includes network device inventory, change audit, and software distribution 
features.

An issue exists in one of the components of the Cisco Management Center 
for IPS Sensors (IPS MC) v2.1 during the generation of the Cisco IOS IPS 
(Intrusion Prevention System) configuration file that may result in some 
signatures belonging to certain classes being disabled during the 
configuration deployment process.

Cisco has made a free software patch available to address this 
vulnerability for affected customers.

DETAILS

Affected Products:
Vulnerable Products:
 * Cisco IOS IPS devices that have been configured by IPS MC v2.1.

Products Confirmed Not Vulnerable:
 * Cisco IOS IPS devices that have NOT been configured by IPS MC v2.1. 
This category includes Cisco IOS IPS devices that have been configured by 
using any of the following methods:
  o Cisco IDS MC (Management Center for IDS Sensors)
  o Cisco SDM (Security Device Manager)
  o Cisco IOS CLI (Command Line Interface)

 * Any other Cisco IDS/IPS solution, configured by either Cisco IPS MC 
v2.1, Cisco IDS MC (any version), Cisco SDM (any version) or by using the 
Cisco IOS CLI. These include:
  o Cisco IOS IDS
  o Cisco PIX/ASA IDS
  o Cisco IPS 4200 Series Sensors
  o Cisco Catalyst 6500/7600 Series Intrusion Detection System (IDSM-2) 
Module
  o Cisco IDS Network Module (NM-CIDS-K9)
  o Cisco ASA Advanced Inspection and Prevention (AIP) Security Services 
Module


No other Cisco products are currently known to be affected by these 
vulnerabilities.

Details:
Some Cisco routers running Cisco IOS include a feature called Cisco IOS 
IPS. The Cisco IOS IPS acts as an in-line intrusion protection sensor, 
watching packets and sessions as they flow through the router and scanning 
each packet to match any of the Cisco IOS IPS signatures that have been 
enabled on the device configuration. When it detects suspicious activity, 
it responds before network security can be compromised and logs the event 
through Cisco IOS syslog messages or Security Device Event Exchange 
(SDEE). The network administrator can configure Cisco IOS IPS to choose 
the appropriate response to various threats.

Customers can use multiple methods, including Cisco IPS MC, Cisco IDS MC, 
Cisco SDM and the Cisco IOS CLI, to enable, disable and configure Cisco 
IOS IPS signatures. Some signatures dealing with TCP or UDP traffic 
analyze traffic destined to specific ports. Those ports are pre-configured 
with default values, and some signatures might allow changes to the list 
of ports to be monitored.

If the Cisco IOS IPS devices have been configured by using the Cisco IPS 
MC v2.1, the Cisco IPS MC might download a configuration file to the 
device that does not contain a value for the port field in one or more 
signatures, resulting in the affected Cisco IOS IPS device disabling those 
signatures. Only signatures using either the STRING.TCP or STRING.UDP 
signature micro-engine (SME) are affected by this vulnerability. 
Additionally, this behavior only happens if those signatures were enabled 
and configured from the Cisco IPS MC GUI ; signatures belonging to the 
STRING.TCP or STRING.UDP SMEs that were previously configured on the 
device and imported into the Cisco IPS MC will not experience this issue.

The list of signatures currently loaded into a Cisco IOS IPS device and 
their status can be obtained by executing the show ip ips signatures 
command. The following abbreviated output shows signatures currently 
loaded into the device, both enabled and disabled:

Router#show ip ips signatures
Builtin signatures are configured
Signatures were last loaded from flash:128MB.sdf

Cisco SDF release version 128MB.sdf v4

Trend SDF release version V0.0

*=Marked for Deletion Action=(A)larm,(D)rop,(R)eset  Trait=AlarmTraits
MH=MinHits       AI=AlarmInterval        CT=ChokeThreshold
TI=ThrottleInterval  AT=AlarmThrottle        FA=FlipAddr
WF=WantFrag

Signature Micro-Engine: OTHER (4 sigs)
SigID:SubID On Action Sev Trait   MH  AI  CT  TI AT FA WF Version
----------- -- ------ ---- ----- ----- ----- ----- ----- -- -- -- -------
 1201:0   Y  A  HIGH   0   0   0  30  15 FA N N 2.2.1.5
 1202:0   Y  A  HIGH   0   0   0  100  15 FA N N 2.2.1.5
 1203:0   Y  A  HIGH   0   0   0  30  15 FA N N 2.2.1.5
 3050:0   Y  A  HIGH   0   0   0   0  15 FA N  1.0  

Signature Micro-Engine: STRING.ICMP (1 sigs)
SigID:SubID On Action Sev Trait   MH  AI  CT  TI AT FA WF Version
----------- -- ------ ---- ----- ----- ----- ----- ----- -- -- -- -------
 2156:0   Y  A   MED   0   0   0   0  15 FA N  S54  

Signature Micro-Engine: STRING.UDP (16 sigs)
SigID:SubID On Action Sev Trait   MH  AI  CT  TI AT FA WF Version
----------- -- ------ ---- ----- ----- ----- ----- ----- -- -- -- -------
 4060:0   Y  A   MED   0   0   0   0  15 FA N  S10  
 4060:1   Y  A   MED   0   0   0   0  15 FA N  S173 
 4607:0   Y  A  HIGH   0   0   0   0  15 FA N  S30  
 4607:1   Y  A  HIGH   0   0   0   0  15 FA N  S30  
 4607:2   Y  A  HIGH   0   0   0   0  15 FA N  S30  
 4607:3   Y  A  HIGH   0   0   0   0  15 FA N  S30  
 4607:4   Y  A  HIGH   0   0   0   0  15 FA N  S30  
 4608:0   N  A  HIGH   0   1   0   0  15 FA N  S30  
 4608:1   Y  A  HIGH   0   1   0   0  15 FA N  S30  
 4608:2   Y  A  HIGH   0   1   0   0  15 FA N  S30  
11000:0   N  A   LOW   0   0   0   0  15 FA N  S37  
11000:1   Y  A   LOW   0   0   0   0  15 FA N  S37  
11000:2   Y  A   LOW   0   0   0   0  15 FA N  S136 
11207:0   Y  A  INFO   0   0   0   0  15 FA N  S139 
11208:0   Y  A  INFO   0   0   0   0  15 FA N  S139 
11209:0   Y  A  INFO   0   0   0   0  15 FA N  S139 

Signature Micro-Engine: STRING.TCP (60 sigs)
SigID:SubID On Action Sev Trait   MH  AI  CT  TI AT FA WF Version
----------- -- ------ ---- ----- ----- ----- ----- ----- -- -- -- -------
 3116:0   Y  A  HIGH   0   1   0   0  15 FA N  S12  
 3117:0   N  A   LOW   0   1   0   0  15 FA N  S13  
 3117:1   Y  A   LOW   0   1   0   0  15 FA N  S13  
 3120:0   Y  A   LOW   0   1   0   0  15 FA N  S13  
 3120:1   Y  A   LOW   0   1   0   0  15 FA N  S13  
 3132:0   Y  A  HIGH   0   1   0   0  15 FA N  S67  
 3132:1   Y  A  HIGH   0   1   0   0  15 FA N  S67  
 3135:0   Y  A  HIGH   0   1   0   0  15 FA N  S73  
 3137:1   Y  A  HIGH   0   1   0   0  15 FA N  S83  
 3137:2   Y  A  HIGH   0   1   0   0  15 FA N  S128 
 3141:0   Y  A  HIGH   0   1   0   0  15 FA N  S94  
 3142:1   Y  A  HIGH   0   1   0   0  15 FA N  S92  
 3152:0   Y  A   MED   0   1   0   0  15 FA N  2.1.1 
 3450:0   Y  A   LOW   0   1   0   0  15 FA N  1.0  
 5570:0   Y  A R HIGH   0   1   0   0  15 FA N  S185 
 5571:0   Y  A R HIGH   0   1   0   0  15 FA N  S185 
 9479:0   Y  A  HIGH   0   1   0   0  15 FA N  S104 
 9480:0   Y  A  HIGH   0   1   0   0  15 FA N  S104 
 9481:0   Y  A  HIGH   0   1   0   0  15 FA N  S104 
 9482:0   Y  A  HIGH   0   1   0   0  15 FA N  S104 
 9483:0   Y  A  HIGH   0   1   0   0  15 FA N  S104 
--More--


Any signature with a capital N under the 'On' column is DISABLED, while 
any signature with a capital Y under the same column is ENABLED. In this 
example, signatures 4608:0 and 11000:0 (belonging to the STRING.UDP SME), 
and signature 3117:0 (belonging to the STRING.TCP SME) are listed as 
disabled. For each signature listed as disabled in the output of the show 
ip ips signatures command, a corresponding ip ips signature <SigID> 
<SubsigID> disable command should be visible on the running configuration. 
This is an example of the show running-configuration command, using a 
filter to only display configuration lines belonging to signatures that 
have been disabled:

Router#show running-config | include ip ips signature .* disable
ip ips signature 11000 0 disable
ip ips signature 4608 0 disable
ip ips signature 3117 0 disable
Router#

Impact:
While this is not a vulnerability in the Cisco IOS IPS code itself, in the 
processing performed by Cisco IOS IPS on traffic traversing the device, or 
in the Cisco IPS MC v2.1, this vulnerability might result in an incomplete 
analysis of network traffic traversing the Cisco IOS IPS device, which 
could allow some attacks to go unnoticed.

Software Versions and Fixes:
When considering software upgrades, please also consult  
<http://www.cisco.com/en/US/products/products_security_advisories_listing.html>; http://www.cisco.com/en/US/products/products_security_advisories_listing.html and any subsequent advisories to determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the devices 
to be upgraded contain sufficient memory and that current hardware and 
software configurations will continue to be supported properly by the new 
release. If the information is not clear, contact the Cisco Technical 
Assistance Center ("TAC") for assistance.

Cisco has developed a software fix for this vulnerability. Once the fix is 
applied to a VMS server running IPS MC v2.1, the IPS MC will correctly 
populate the port field attached to a signature using either the 
STRING.TCP or STRING.UDP SME. Additional steps will be required to be 
performed. Please read the README file published together with the 
software fix.

In order to obtain this software fix, customers should access the VMS 
Software download page for IDS MC and IPS MC, available at  
<http://www.cisco.com/pcgi-bin/tablebuild.pl/mgmt-ctr-ids-app>; 
http://www.cisco.com/pcgi-bin/tablebuild.pl/mgmt-ctr-ids-app. The fix 
consists of the following three files:

 * idsmdc2.1.0-win-CSCsc336961.tar - this file contains the fix itself for 
IPS MC v2.1 running on the Windows operating system.
 * CSCOids2.1.0-sol-CSCsc336961.tar - this file contains the fix itself 
for IPS MC v2.1 running on the Solaris operating system.
 * CSCsc33696-README.txt - this file contains instructions on how to apply 
the software fix to an affected IPS MC v2.1 installation (either Windows 
or Solaris) and any needed pre and post installation tasks to be carried 
out by the user.



ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру