The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Multiple Vulnerabilities in Cisco Firewall Services Module (FWSM)


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 20 Feb 2007 14:02:46 +0200
Subject: [NEWS] Multiple Vulnerabilities in Cisco Firewall Services Module (FWSM)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070220113345.CED6B5B91@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
X-Spam-Status: No, hits=4.059 tagged_above=2 required=5 tests=LONGWORDS,
 MSGID_FROM_MTA_ID
X-Spam-Level: ****

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Multiple Vulnerabilities in Cisco Firewall Services Module (FWSM)
------------------------------------------------------------------------


SUMMARY

Multiple vulnerabilities exist in the Cisco Firewall Services Module 
(FWSM). These vulnerabilities occur in the processing of specific 
Hypertext Transfer Protocol (HTTP), Secure HTTP (HTTPS), Session 
Initiation Protocol (SIP), and Simple Network Management Protocol (SNMP) 
traffic. If verbose logging is enabled for debugging purposes, a 
vulnerability exists when the FWSM processes packets destined to itself. 
All of these vulnerabilities may result in a reload of the device.

An additional vulnerability is included in this advisory in which the 
manipulation of access control lists (ACLs) that make use of object groups 
may corrupt the ACL and create a situation where unwanted traffic may be 
permitted or desirable traffic may be blocked.

These vulnerabilities are independent of each other; a release that is 
affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this 
advisory.

Cisco has made free software available to address this issue for affected 
customers.

DETAILS

Affected Products:
The vulnerabilities described in this document apply to the FWSM. The 
companion advisory  
<http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml contains 
information about similar vulnerabilities that affect the Cisco PIX 500 
Series Security Appliances and the Cisco ASA 5500 Series Adaptive Security 
Appliances.

Products Confirmed Not Vulnerable:
With the exception of the Cisco PIX 500 Series Security Appliances and the 
Cisco ASA 5500 Series Adaptive Security Appliances, no other Cisco 
products are known to be vulnerable to the issues described in this 
advisory.

Details:
The Cisco Firewall Services Module is a high-speed, integrated firewall 
module for Catalyst 6500 series switches and Cisco 7600 series routers. It 
offers firewall services with stateful packet filtering and deep packet 
inspection.

Multiple vulnerabilities exist in certain versions of the FWSM software 
that may cause the device to unexpectedly reload or that may cause traffic 
to be permitted or denied contrary to the security policy in place.

1. Enhanced Inspection of Malformed HTTP Traffic May Cause Reload
This vulnerability may cause a FWSM to reload when the FWSM performs 
enhanced inspection of HTTP requests, and a malformed HTTP request is 
inspected by the FWSM. The FWSM only performs enhanced inspection of HTTP 
traffic when the command inspect http <appfw> is present in the 
configuration (appfw is the name of a specific HTTP map.) This command is 
disabled by default.

Note: Enhanced inspection of HTTP traffic is what makes a configuration 
affected. Regular inspection of HTTP traffic (through the command inspect 
http without an HTTP map) will not make a configuration affected by this 
vulnerability.

For information on what enhanced inspection of HTTP traffic does, and how 
to configure it, please refer to the following URL:

 
<http://www.cisco.com/en/US/products/hw/switches/ps708/products_module_configuration_guide_chapter09186a0080577c72.html#wp1390330> http://www.cisco.com/en/US/products/hw/switches/ps708/products_module_configuration_guide_chapter09186a0080577c72.html#wp1390330

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsd75794>; 
CSCsd75794 ( registered customers only) .

2. Inspection of Malformed SIP Messages May Cause Reload
This vulnerability may cause a FWSM to reload when a malformed SIP message 
is received and deep packet inspection of SIP messages is enabled through 
the command fixup protocol sip (in FWSM software 2.3.x and before) or 
through the command inspect sip (in FWSM software 3.x and later). SIP 
inspection is enabled by default in the 2.3.x series and before and is 
disabled by default in the 3.x series and later.

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsg80915>; 
CSCsg80915 ( registered customers only) .

3. Processing of Packets Destined to the FWSM May Cause Reload
This vulnerability will cause the FWSM to reload when trying to generate 
syslog message 710006. For this to happen the following two conditions 
must be satisfied:

 * The FWSM receives a packet for one of the device's IP addresses and the 
message is not one of the following protocols: TCP, UDP, ICMP, OSPF, 
Failover, PIM, IGMP, and ESP. The source of the packet is not relevant.
 * Logging must be enabled at a level high enough to generate syslog 
message 710006. By default this is debugging level (level 7). Please note 
that logging is disabled by default, and Cisco recommends customers only 
log at debugging level for debugging and troubleshooting purposes.


Note: The documentation for the Cisco Security Monitoring, Analysis and 
Response System (CS-MARS) suggests logging at the debugging level so more 
events can be reported by the firewall.

For more information on syslog message 710006 please refer to the 
following document:
 * Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall 
Services Module Logging Configuration and System Log Messages, 3.1

 
<http://www.cisco.com/en/US/products/hw/switches/ps708/products_system_message_guide_chapter09186a00804d74bd.html#wp1285757> http://www.cisco.com/en/US/products/hw/switches/ps708/products_system_message_guide_chapter09186a00804d74bd.html#wp1285757

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCse85707>; 
CSCse85707 ( registered customers only) .

4. Processing of Malformed HTTPS Requests May Cause Reload
This vulnerability may cause the FWSM to reload when a user tries to 
access a web site and the network administrator has configured the device 
to authenticate users before granting them network access. This feature is 
known as "authentication for network access", or auth-proxy, and is 
enabled through the command aaa authentication match or aaa authentication 
include.

The reload is actually triggered by a specific HTTPS request that is 
invalid, and therefore, unlikely to be generated by a regular web browser.

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsg50228>; 
CSCsg50228 ( registered customers only) .

5. Processing of Long HTTP Requests May Cause Reload
This vulnerability may also cause the FWSM to reload when the 
administrator has enabled "authentication for network access 
("auth-proxy") through the commands aaa authentication match or aaa 
authentication include. However, in this case, the HTTP request that 
causes the reload is valid, although it is not a normal request in the 
sense that the URL being requested is very long. A web browser could 
potentially generate such a request during regular browsing.

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsd91268>; 
CSCsd91268 ( registered customers only) .

6. Processing of HTTPS Traffic May Cause Reload
This vulnerability may cause a FWSM to reload when the FWSM receives a 
particular type of HTTPS traffic directed to the FWSM itself. This is only 
a concern when the HTTPS server on the FWSM is enabled through the command 
http server enable. This command is disabled by default.

Cisco is aware of a commercial vulnerability scanner that can generate the 
HTTPS traffic that triggers the reload. We are not aware of regular web 
browser traffic that triggers this bug.

This vulnerability is documented in Cisco Bug ID  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsd91268>; 
CSCsf29974 ( registered customers only) .

7. Processing of Malformed SNMP Requests May Cause a Reload
This vulnerability may cause a FWSM to reload upon receipt of a malformed 
SNMP message from a trusted device. The trusted device must be allowed 
explicit SNMP poll access via the command snmp-server host <interface 
name> <IP of trusted device>.

This vulnerability is documented in Cisco Bug IDs  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsf29974>; 
CSCse52679 ( registered customers only) .

8. Manipulation of ACL May Cause ACL Corruption
This vulnerability may cause access control entries (ACEs) in an ACL to be 
evaluated out of order, or not to be evaluated. This ACL corruption is 
manifested, besides the obvious traffic implications, when the output from 
the show access-list command and the corresponding ACL shown by the show 
running-config command appear to be out of sync. Only a manual reload of 
the device will cause this condition to go away.

The ACL corruption occurs when an ACL that makes use of object groups is 
manipulated.

This vulnerability is documented in Cisco Bug IDs  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCse60868>; 
CSCse60868 ( registered customers only) and  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCse99740>; 
CSCse99740 ( registered customers only) .

Impact:
In all cases, with the exception of the "Manipulation of ACL May Cause ACL 
Corruption" vulnerability, successful exploitation of any vulnerability 
may cause a reload of the affected device. Repeated exploitation could 
result in a sustained Denial-of-Service (DoS) condition.

In the case of the "Processing of Long HTTP Requests May Cause Reload" 
vulnerability ( 
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCsd91268>; 
CSCsd91268), the reload occurs because a stack-based buffer is overflowed. 
In this case remote code execution may be possible.

In the case of the "Manipulation of ACL May Cause ACL Corruption" 
vulnerability, a device that becomes affected after an administrator 
manipulates an ACL with object groups may allow traffic that would 
normally be denied, or would deny traffic that would normally be 
permitted. If the ACL is used for other functions like NAT (policy NAT and 
NAT exemption), AAA (auth-proxy), control of access to the device (SSH, 
Telnet, HTTP, ICMP), then those functions may be adversely affected as 
well.

Workarounds
Additional mitigations that can be deployed on Cisco devices within the 
network are available in the Cisco Applied Intelligence companion document 
for this advisory:  
<http://www.cisco.com/warp/public/707/cisco-air-20070214-firewall.shtml>; 
http://www.cisco.com/warp/public/707/cisco-air-20070214-firewall.shtml

1. Enhanced Inspection of Malformed HTTP Traffic May Cause Reload
It is possible to mitigate this vulnerability by disabling enhanced 
inspection of HTTP traffic. Please note that disabling HTTP enhanced 
inspection will prevent the FWSM from protecting against specific attacks 
and other threats that may be associated with HTTP traffic. Enhanced 
inspection of HTTP traffic is disabled by removing the command inspect 
http  from the configuration, where appfw is the name of an HTTP map.

For further information about the inspect http <appfw> command, and the 
type of checks it performs on HTTP traffic, please see the documentation 
for this command at:

 
<http://www.cisco.com/en/US/products/hw/switches/ps708/products_command_reference_chapter09186a008048e279.html#wp1570030> http://www.cisco.com/en/US/products/hw/switches/ps708/products_command_reference_chapter09186a008048e279.html#wp1570030

Please note that the command inspect http (without an HTTP map) can be 
left in the configuration and the device will not be affected by this 
vulnerability.

2. Inspection of Malformed SIP Messages May Cause Reload
It is possible to mitigate this vulnerability by disabling deep packet 
inspection ("fixup" in software version prior to 3.x or "inspect" in 
software version 3.x and later) of SIP messages. Note, however, that this 
may have negative impact on devices terminating SIP sessions since SIP 
traffic will no longer undergo stateful application inspection, and 
devices which terminate sessions for this protocol will be exposed to 
packets that may cause these devices to crash or become compromised.

If you are running a 3.x FWSM software release, then the alternative is to 
allow traffic only from the trusted hosts. The configuration to accomplish 
this is as follows:

    access-list sip-acl extended permit udp 10.1.1.0 255.255.255.0 host 
192.168.5.4 eq sip
    access-list sip-acl extended permit udp host 192.168.5.4 10.1.1.0 
255.255.255.0 eq sip

    class-map sip-traffic
     match access-list sip-acl
    !
    !
    policy-map global_policy
     class inspection_default
      inspect dns maximum-length 512
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect netbios
      inspect tftp
     class sip-traffic
      inspect sip
    !
    service-policy global_policy global


In this example SIP endpoints are any host within 10.1.1.0 network (inside 
the trusted network) and a host with the IP address of 192.168.5.4 
(outside of the trusted network). You would have to substitute these IP 
addresses with the ones that are used in your network.

Please note that SIP is an UDP-based protocol, so spoofing SIP messages is 
possible.

3. Processing of Packets Destined to the FWSM May Cause Reload
Since this vulnerability only manifests itself when syslog message 710006 
is generated, it is possible to workaround the vulnerability either by 
disabling generation of syslog message 710006 altogether, or by logging at 
a syslog level that is lower than the syslog level at which this message 
is generated.

By default, syslog message 710006 is generated at syslog level 7 
("debugging"), so a viable workaround is to log at level 6 or lower. This 
can be accomplished with the command logging  6. If syslog message 710006 
has been moved to a different logging level, then the logging level in use 
must be changed accordingly to prevent the message from being generated.

If logging at the "debugging" level is necessary, the vulnerability can 
also be eliminated by disabling this particular syslog message by using 
the command no logging message 710006.

4. Processing of Malformed HTTPS Requests May Cause Reload
There are no workarounds for this vulnerability.

5. Processing of Long HTTP Requests May Cause Reload
There are no workarounds for this vulnerability.

6. Processing HTTPS Traffic May Cause a Reload
Since this vulnerability is caused by the HTTPS server on the FWSM failing 
to handle certain types of HTTPS traffic, disabling the HTTPS server 
through the command no http server enable is a valid workaround if this 
functionality is not needed. Please note that this functionality is used 
by ASDM, so if configuration of the FWSM is exclusively done through ASDM 
disabling the HTTPS server may not be a viable workaround.

Additionally, it is possible to limit the exposure by allowing HTTPS 
connections only from trusted IP addresses or networks. This can be 
accomplished with the http command. For example, the following command:

     FWSM(config)# http 192.168.1.10 255.255.255.255 inside


will only permit HTTPS connections from the IP address 192.168.1.10.

7. Processing of Malformed SNMP Requests May Cause a Reload
This bug can only be triggered by a malformed SNMP message that comes from 
a device that is allowed SNMP access on the FWSM. If SNMP is not needed it 
can be removed through the command no snmp-server host <interface name> 
<IP address of trusted device>, which will eliminate the vulnerability.

8. Manipulation of ACL May Cause ACL Corruption
There are no workarounds for this vulnerability. However, please note that 
the ACL corruption does not occur during normal operation of the device 
and it cannot be triggered by some type of traffic. It can only occur if 
an administrator makes configuration changes (and more specifically, if an 
administrator manipulates an ACL.) For this reason, if ACL changes are 
made only during a maintenance window, and the FWSM is reloaded after 
making those changes, there should not be any concerns with this 
vulnerability.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру