TUCoPS :: Cisco :: cisco3~2.txt

Cisco Gigabit ethernet vulnerability

COMMAND

    cisco

SYSTEMS AFFECTED

    Gigabit Ethernet and Fast Ethernet cards installed in Gigabit Switched Routers

PROBLEM

    Following is based on Cisco Security Advisory.  A defect in  Cisco
    IOS(tm) Software running on  all models of Gigabit  Switch Routers
    (GSRs) configured  with Gigabit  Ethernet or  Fast Ethernet  cards
    may cause  packets to  be forwarded  without correctly  evaluating
    configured  access   control  lists   (ACLs).    In  addition   to
    circumventing the access control lists, it is possible to stop  an
    interface from forwarding  any packets, thus  causing a denial  of
    service.

    Only the  particular combination  of equipment  described in  this
    notice is vulnerable.  No other combinations of routers and  cards
    are  vulnerable.    Network  topologies  that   include  a   large
    flat/bridged network may be more susceptible to this vulnerability
    than some other topologies.  This vulnerability is present in  all
    Cisco  IOS  Software  releases  for  the GSR starting with release
    11.2(15)GS1A.   Versions  of  Cisco  IOS  Software  containing the
    repair  for  this  defect  are  listed  below.   This  defect   is
    documented as Cisco bug ID CSCdp35794.

    When access lists are used on a GSR with Gigabit Ethernet or  Fast
    Ethernet cards  installed and  configured, line  card failures may
    occur  that  require  a  reset  of  the affected card and internal
    queuing data structures may be  corrupted.  The problem is  due to
    differences in the optimized handling of certain types of  packets
    from shared media that  directly affects the evaluation  of access
    control lists  on Gigabit  Ethernet and  Fast Ethernet interfaces.
    The problem is more likely to  occur on a large shared or  bridged
    Ethernet segment,  and is  more evident  with the  use of compiled
    access control lists  (also known as  Turbo ACLs) than  with other
    access  control  lists.   The  problem  cannot occur unless access
    control lists are configured on the affected interfaces.

    Under certain  conditions it  is possible  to circumvent  compiled
    access control lists  with a moderate  probability of success  and
    circumvent extended  access control  lists with  a low probability
    of success. A possible side effect is that the attacked  interface
    may stop  forwarding packets  without logging  an error, requiring
    the card  to be  reset via  software.   Due to  the nature of this
    vulnerability, it  is difficult  to predict  the exact  results of
    any such exploitation.

    Network  topologies  that  include  a  large  flat/bridged network
    (several hundred hosts  or more) may  be more susceptible  to this
    vulnerability than some other  topologies.  However, by  sending a
    large number of  specific packets, it  may be possible  to trigger
    this vulnerability on any topology.

SOLUTION

    There  is  no  workaround.   Customers  are  urged  to  upgrade to
    unaffected  versions  of  software  as  soon as possible.  Gigabit
    Switched  Routers  with  other  cards  are not susceptible to this
    vulnerability.  Similary, Gigabit Ethernet and Fast Ethernet cards
    that  are  installed  in  other  router models are not susceptible
    to this vulnerability.  Specifically, the RSP/7200 series  routers
    are not affected.

    This  vulnerability  affects  Gigabit  Ethernet  and Fast Ethernet
    cards on the following Gigabit Switch Routers:

        * 12008 Gigabit Switch Router
        * 12012 Gigabit Switch Router
        * 12016 Gigabit Switch Router

    This vulnerability affects all releases of Cisco GSR IOS  Software
    starting with 11.2(15)GS1A.  This vulnerability has been corrected
    in the following IOS releases:

        * 11.2(19)GS0.2
        * 12.0(8.0.2)S
        * 12.0(7)S1
        * 12.0(7.4)S
        * 12.0(8.3)SC
        * 12.0(7)SC

    All  subsequent  releases  of  Cisco  IOS  Software  for  the  GSR
    incorporate this fix.  To determine if your system is affected  by
    this problem,  execute the  show version  command while  in global
    configuration mode.  If the output does not contain the words  "GS
    Software" in  the banner  and "FastEthernet"  or "GigabitEthernet"
    in the list  of installed cards,  then the system  is not affected
    by the vulnerability described in this advisory.

    If  show  version  displays  "GS  Software"  and also reports that
    "FastEthernet"  or  "GigabitEthernet"  cards  are installed in the
    system, then the current IOS release number should be compared  to
    those listed above to determine if an upgrade is necessary.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH