TUCoPS :: Cisco :: cisco22.htm

Cisco NAT glitch
Vulnerability

    CISCO

Affected

    CISCO

Description

    Blue  Boar  found  following.   He  was  doing some research about
    Network  Address   Translation  (NAT)   on  a   cisco  box.    The
    configuration he  was using  when he  found this  problem was  NAT
    overload was an  inside net, 192.168.0,  and a Windows  PC sitting
    at 192.168.0.2.  The  outside interface was another  ethernet (the
    were both FastEthernet, actually.. this was a 2621).

    Blue  Boar  was  playing  with  an  FTP  client on the 192.168.0.2
    machine,  watching  the  translation  tables  with  the sho ip nat
    trans command.  He was trying to see if he could get the Cisco  to
    open  arbitrary  holes  to  other  hosts  by  sending  manual PORT
    commands.  He didn't get that to work, but he found a cute  little
    problem.

    At the  time, he  was telnetted  to the  router from  the outside,
    which is  how he  was watching  the translations  table.  From the
    inside,  he  issued  the  command  PORT  192,168,0,2,0,23  (he was
    listening  on  port  23  with  netcat).   My telnet session to the
    outside died.

    After telneting  back right  away, and  that worked.   Whenever he
    issued that PORT command, his telnet connection died.

    We have to assume  that since the NAT  config Blue Boar used  uses
    the router's own (outside) IP address that the NAT is  interfering
    with the router's own listening ports.

Solution

    Cisco have confirmed the behavior  as documented.  The section  of
    code responsible for  the behavior has  been identified and  a fix
    is in development.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH