TUCoPS :: Cisco :: cisco17.htm

Cisco Catalyst 1200, 2900, 5000, 5500 DoS
Vulnerability

    CISCO

Affected

    Catalyst 1200, 2900, 5000, and 5500 series switches

Description

    Following is based  on ISS Security  Advisory.  Internet  Security
    Systems (ISS)  X-Force has  discovered several  vulnerabilities in
    Cisco Catalyst  Series Ethernet  Switches running  the Cisco fixed
    configuration  switch  software.   Cisco  Catalyst  switches   are
    commonly used  in high  volume production  environments supporting
    high-end servers and "virtual LAN" configurations.

    Vulnerable Software Versions are:
        - Catalyst 1200 family supervisor software versions up to  and
          including 4.29 are vulnerable,
        - Catalyst  2900 family  supervisor software  revisions up  to
          and including 2.1(5) are vulnerable,
        - Catalyst 5000 and 5500 family supervisor software  revisions
          up to and including 2.1(5) are vulnerable,
        - For  the  2900,  5000,  and  5500  series,  minor  revisions
          2.1(501) and 2.1(502) are also vulnerable.

    The  Cisco  Catalyst  5000  Series  Ethernet  Switches  run  fixed
    configuration  switch   software.   This   software  operates   an
    undocumented TCP service.  Sending a carriage return character  to
    this port causes the switch to immediately reset.  An attacker may
    repeat  this  action  indefinitely,  causing  a  denial of network
    services.  The switch software  does not provide any IP  filtering
    options  to  prevent  this  type  of  attack.   These  bugs  carry
    following bug IDs: Cisco bug ID CSCdi74333 and bug ID CSCdj71684.

    A remote  attacker who  knows how  to exploit  this vulnerability,
    and who  can make  a connection  to TCP  port 7161  on an affected
    switch, can cause the supervisor module of that switch to  reload.
    While the  supervisor is  reloading, the  switch will  not forward
    traffic,  and  the  attack  will  therefore  deny  service  to the
    equipment  attached  to  the  switch.   The  switch  will  recover
    automatically,  but  repeated  attacks  can  extend  the denial of
    service indefinitely.

Solution

    The Catalyst 2900XL and Catalyst  2926 are not affected.   Upgrade
    your switch  to the  most recent  version of  the Catalyst  switch
    software, or any version that  is not vulnerable.  Fixed  software
    for the Catalyst 5xxx and Catalyst 29xx series began shipping with
    new switches in mid-1997. Sales  of the Catalyst 12xx family  were
    stopped before the release of  software version 4.30; if you  have
    not upgraded  your software  since installing  your Catalyst  12xx
    switch, you are affected by this vulnerability.

    This  vulnerability  may  be  worked  around  by  assigning  no IP
    addresses  to  affected  Cisco  Catalyst  switches.  However, this
    workaround will have the effect of disabling all remote management
    of those  switches.   Another possible  workaround is  to use  the
    filtering  capabilities  of  surrounding  routers and/or dedicated
    firewall  devices   to  prevent   untrusted  hosts   from   making
    connections to TCP port 7161 on affected switches.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH