lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2004021994.cisco-sa-20040219-ONS__46961.0634180301$1077221375@psirt.cisco.com>
Date: Thu, 19 Feb 2004 9:4:25 -0800
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

  Cisco Security Advisory: Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS
                             15600 Vulnerabilities

Revision 1.0

  For Public Release 2004 February 19 1700 UTC (GMT)

     ----------------------------------------------------------------------

Contents

     Summary
     Affected Products
     Details
     Impact
     Software Versions and Fixes
     Obtaining Fixed Software
     Workarounds
     Exploitation and Public Announcements
     Status of This Notice: FINAL
     Distribution
     Revision History
     Cisco Security Procedures

     ----------------------------------------------------------------------

Summary

   Multiple vulnerabilities exist in the Cisco ONS 15327 Edge Optical
   Transport Platform, the Cisco ONS 15454 Optical Transport Platform, the
   Cisco ONS 15454 SDH Multiplexer Platform, and the Cisco ONS 15600
   Multiservice Switching Platform.

   These vulnerabilities are documented as Cisco bug ID
   CSCec17308/CSCec19124(tftp), CSCec17406(port 1080), and
   CSCec66884/CSCec71157(SU access). There are workarounds available to
   mitigate the effects of these vulnerabilities.

   This advisory will be posted at
   http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml .

Affected Products

     * CSCec17308/CSCec19124(tftp)

   +------------------------------------------+
   |      Product       |  Affected Releases  |
   |--------------------+---------------------|
   |                    |4.1(0) to 4.1(2)     |
   |15327               |                     |
   |                    |4.0(x)               |
   |--------------------+---------------------|
   |                    |4.5(x)               |
   |                    |                     |
   |15454, 15454 SDH    |4.1(0) to 4.1(2)     |
   |                    |                     |
   |                    |4.0(x)               |
   |--------------------+---------------------|
   |15600               |1.0(x)               |
   +------------------------------------------+

     * CSCec17406(port 1080)

   +------------------------------------------+
   |      Product       |  Affected Releases  |
   |--------------------+---------------------|
   |                    |4.1(0)               |
   |15327               |                     |
   |                    |4.0(0) to 4.0(1)     |
   |--------------------+---------------------|
   |                    |4.5(x)               |
   |                    |                     |
   |15454, 15454 SDH    |4.1(0)               |
   |                    |                     |
   |                    |4.0(0) to 4.0(1)     |
   |--------------------+---------------------|
   |15600               |Not Affected         |
   +------------------------------------------+

     * CSCec66884/CSCec71157(SU access)

   +------------------------------------------+
   |     Product     |   Affected Releases    |
   |-----------------+------------------------|
   |                 |4.1(0) to 4.1(2)        |
   |15327            |                        |
   |                 |4.0(x)                  |
   |-----------------+------------------------|
   |                 |4.5(x)                  |
   |                 |                        |
   |15454, 15454 SDH |4.1(0) to 4.1(2)        |
   |                 |                        |
   |                 |4.0(x)                  |
   |-----------------+------------------------|
   |15600            |1.x(x) except for 1.1(1)|
   +------------------------------------------+

   Products not affected by these vulnerabilities include the Cisco ONS 15800
   series, ONS 15500 series extended service platform, ONS 15302, ONS 15305,
   ONS 15200 series metro DWDM systems, and the ONS 15190 series IP transport
   concentrator.

   Cisco ONS 15327 hardware running ONS Release 1.x(x) and 3.x(x) and Cisco
   ONS 15454 hardware running ONS Releases 2.x(x) and 3.x(x) are not affected
   by these vulnerabilities.

   No other Cisco products are currently known to be affected by these
   vulnerabilities.

   To determine your software revision, view the Help > About window on the
   CTC management software.

Details

   The affected Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600
   hardware is managed through the XTC, TCC+/TCC2, TCCi/TCC2, and TSC control
   cards respectively. These control cards are usually connected to a network
   isolated from the Internet and local to the customer's environment. This
   limits the exposure to the exploitation of the vulnerabilities from the
   Internet.

     * CSCec17308/CSCec19124(tftp)

       The TFTP service on UDP port 69 is enabled by default to allow both
       GET and PUT commands to be executed without any authentication. Using
       a TFTP client, it is possible to connect to the optical device and
       upload or retrieve ONS system files on the current active TCC in the
       /flash0 or /flash1 directories. It is not possible to upload or
       retrieve any user data files.

       Cisco bug ID CSCec17308 documents the issue on the Cisco ONS 15327,
       ONS 15454 and ONS 15454 SDH, and Cisco bug ID CSCec19124 documents the
       issue on the Cisco ONS 15600 hardware.

     * CSCec17406(port 1080)

       The Cisco ONS 15327, ONS 15454 and ONS 15454 SDH hardware is
       susceptible to an ACK Denial of Service (DoS) attack on TCP port 1080.
       TCP port 1080 is used by network management applications to
       communicate with the controller card. The controller card on the
       optical device will reset under such an attack.

       An ACK DoS attack is conducted by not sending the final ACK required
       for a 3-way TCP handshake to complete, and instead sending an invalid
       response to move the connection to an invalid TCP state.

       The Cisco ONS 15600 Multiservice Switching Platform is not affected by
       this vulnerability.

     * CSCec66884/CSCec71157(SU access)

       Telnet access to the underlying VxWorks operating system, by default,
       is restricted to Superusers only. Due to this vulnerability, a
       superuser whose account is locked out, disabled, or suspended is still
       able to login (Telnet) into the VxWorks shell, using their previously
       configured password.

       Cisco bug ID CSCec66884 documents the issue on the Cisco ONS 15327,
       ONS 15454 and ONS 15454 SDH, and Cisco bug ID CSCec71157 documents the
       issue on the Cisco ONS 15600 hardware.

   The Internetworking Terms and Cisco Systems Acronyms online guides can be
   found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/ .

   These vulnerabilities are documented in the Cisco Bug Toolkit (registered
   customers only) as Cisco bug IDs CSCec17308/CSCec19124(tftp),
   CSCec17406(port 1080), and CSCec66884/CSCec71157(SU access). To access
   this tool, you must be a registered user and you must be logged in.

Impact

     * CSCec17308/CSCec19124(tftp) -- This vulnerability could be exploited
       to launch a DoS attack on the optical device if corrupt ONS system
       files were to be uploaded to the controller card.

     * CSCec17406(port 1080) -- This vulnerability could be exploited to
       launch a DoS attack on the optical device.

       The timing for the data channels traversing the switch is provided by
       the control cards.

       On the Cisco ONS 15454, ONS 15327, and ONS 15454 SDH hardware,
       whenever both the active and standby control cards are rebooting at
       the same time, the synchronous data channels traversing the switch
       drop traffic until the card reboots. Asynchronous data channels
       traversing the switch are not impacted. Manageability functions
       provided by the network element using the TCC+/TCC2, XTC, and
       TCCi/TCC2 control cards are not available until the control card
       reboots.

       On the Cisco ONS 15600 hardware, whenever both the active and standby
       control cards are rebooting at the same time, there is no impact to
       the data channels traversing the switch because the TSC does a
       software reset which does not impact the timing being provided by the
       TSC for the data channels.

       Manageability functions provided by the network element through the
       TSC control cards are not available until the control card reboots.

     * CSCec66884/CSCec71157(SU access) -- This vulnerability could be
       exploited to gain unauthorized access to the optical device.

Software Versions and Fixes

     * CSCec17308/CSCec19124(tftp)

       +----------------------------------------+
       |    Product     |    Fixed Releases     |
       |----------------+-----------------------|
       |15327           |4.1(3) and later       |
       |----------------+-----------------------|
       |15454, 15454 SDH|4.6(1) and later,      |
       |                |4.1(3) and later       |
       |----------------+-----------------------|
       |15600           |1.3(0) and later,      |
       |                |1.1(0) and later       |
       +----------------------------------------+

     * CSCec17406(port 1080)

       +----------------------------------------+
       |    Product     |    Fixed Releases     |
       |----------------+-----------------------|
       |15327           |4.1(1) and later,      |
       |                |4.0(2) and later       |
       |----------------+-----------------------|
       |                |4.6(1) and later,      |
       |15454, 15454 SDH|4.1(1) and later,      |
       |                |4.0(2) and later       |
       |----------------+-----------------------|
       |15600           |Not Affected           |
       +----------------------------------------+

     * CSCec66884/CSCec71157(SU access)

       +----------------------------------------+
       |    Product     |    Fixed Releases     |
       |----------------+-----------------------|
       |15327           |4.1(3) and later       |
       |----------------+-----------------------|
       |15454, 15454 SDH|4.6(1) and later,      |
       |                |4.1(3) and later       |
       |----------------+-----------------------|
       |15600           |1.1(1), 5.0 and later  |
       |                |(when available)       |
       +----------------------------------------+

       Cisco ONS Release 4.6(0) is not affected by these vulnerabilities. The
       recommended release to upgrade to is Cisco ONS release 4.6(1).

   Upgrade procedures can be found as indicated below.

     * The procedure to upgrade to the fixed software version on the Cisco
       ONS 15327 hardware is detailed at
       http://www.cisco.com/univercd/cc/td/doc/product/ong/15327/327doc41/index.htm .

     * The procedure to upgrade to the fixed software version on the Cisco
       ONS 15454 hardware is detailed at
       http://www.cisco.com/univercd/cc/td/doc/product/ong/15400/r46docs/index.htm .

     * The procedure to upgrade to the fixed software version on the Cisco
       ONS 15600 hardware is detailed at
       http://cisco.com/univercd/cc/td/doc/product/ong/15600/index.htm .

Obtaining Fixed Software

   Cisco is offering free software upgrades to address this vulnerability for
   all affected customers.

   Customers may only install and expect support for the feature sets they
   have purchased. By installing, downloading, accessing or otherwise using
   such software upgrades, Customers agree to be bound by the terms of
   Cisco's software license terms found at
   http://www.cisco.com/public/sw-license-agreement.html , or as otherwise set
   forth at the Cisco Connection Online Software Center at
   http://www.cisco.com/public/sw-center/sw-usingswc.shtml .

   Customers with contracts should obtain upgraded software through their
   regular update channels. For most customers, this means that upgrades
   should be obtained through the Software Center on Cisco's worldwide
   website at http://www.cisco.com/tacpage/sw-center/sw-optical.shtml . To
   access the software download URL, you must be a registered user and you
   must be logged in.

   Customers whose Cisco products are provided or maintained through prior or
   existing agreement with third-party support organizations such as Cisco
   Partners, authorized resellers, or service providers should contact that
   support organization for assistance with obtaining the software
   upgrade(s).

   Customers who purchase direct from Cisco but who do not hold a Cisco
   service contract and customers who purchase through third-party vendors
   but are unsuccessful at obtaining fixed software through their point of
   sale should get their upgrades by contacting the Cisco Technical
   Assistance Center (TAC) using the contact information listed below. In
   these cases, customers are entitled to obtain an upgrade to a later
   version of the same release or as indicated by the applicable corrected
   software version in the Software Versions and Fixes section (noted above).

   Cisco TAC contacts are as follows:

     * +1 800 553 2447 (toll free from within North America)

     * +1 408 526 7209 (toll call from anywhere in the world)

     * e-mail: tac@...co.com

   See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for
   additional TAC contact information, including special localized telephone
   numbers and instructions and e-mail addresses for use in various
   languages.

   Please have your product serial number available and give the URL of this
   notice as evidence of your entitlement to an upgrade. Upgrades for
   non-contract customers must be requested through the TAC.

   Please do not contact either "psirt@...co.com" or
   "security-alert@...co.com" for software upgrades.

Workarounds

   There are mitigation workarounds available for these vulnerabilities. The
   Cisco PSIRT recommends that affected users upgrade to a fixed software
   version of code.

     * CSCec17308/CSCec19124(tftp)

       Use access control lists on routers and firewalls that are installed
       in the network to allow only valid network management workstations to
       gain TFTP access to the XTC, TCC+/TCC2, TCCi/TCC2, or TSC control
       cards.

     * CSCec17406(port 1080)

       Use access control lists on routers and firewalls that are installed
       in the network to allow only valid network management workstations to
       gain TCP port 1080 access to the XTC, TCC+/TCC2, TCCi/TCC2, or TSC
       control cards.

     * CSCec66884/CSCec71157(SU access)

       Use access control lists on routers and firewalls that are installed
       in the network to allow only valid network management workstations to
       gain login (Telnet) access to the XTC, TCC+/TCC2, TCCi/TCC2, or TSC
       control cards.

   Refer to http://www.cisco.com/warp/public/707/iacl.html for examples on
   how to apply access control lists (ACLs) on Cisco routers.

Exploitation and Public Announcements

   The Cisco PSIRT is not aware of any public announcements or malicious use
   of the vulnerability described in this advisory.

   These vulnerabilities were reported to PSIRT by Cisco customers or found
   during internal testing.

Status of This Notice: FINAL

   This is a final advisory. Although Cisco cannot guarantee the accuracy of
   all statements in this advisory, all of the facts have been checked to the
   best of our ability. Cisco does not anticipate issuing updated versions of
   this advisory unless there is some material change in the facts. Should
   there be a significant change in the facts, Cisco may update this
   advisory.

   A stand-alone copy or Paraphrase of the text of this security advisory
   that omits the distribution URL in the following section is an
   uncontrolled copy, and may lack important information or contain factual
   errors.

Distribution

   This advisory will be posted on Cisco's worldwide website at
   http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml .

   In addition to worldwide web posting, a text version of this notice is
   clear-signed with the Cisco PSIRT PGP key having the fingerprint 8C82 5207
   0CA9 ED40 1DD2 EE2A 7B31 A8CF 32B6 B590 and is posted to the following
   e-mail and Usenet news recipients.

     * cust-security-announce@...co.com

     * first-teams@...st.org (includes CERT/CC)

     * bugtraq@...urityfocus.com

     * vulnwatch@...nwatch.org

     * cisco@...t.colorado.edu

     * cisco-nsp@...k.nether.net

     * full-disclosure@...ts.netsys.com

     * comp.dcom.sys.cisco@...sgate.cisco.com

     * Various internal Cisco mailing lists

   Future updates of this advisory, if any, will be placed on Cisco's
   worldwide website, but may or may not be actively announced on mailing
   lists or newsgroups. Users concerned about this problem are encouraged to
   check the above URL for any updates.

Revision History

   +------------------------------------------+
   |            |                |Initial     |
   |Revision 1.0|2004-February-19|public      |
   |            |                |release.    |
   +------------------------------------------+

Cisco Security Procedures

   Complete information on reporting security vulnerabilities in Cisco
   products, obtaining assistance with security incidents, and registering to
   receive security information from Cisco, is available on Cisco's worldwide
   website at
   http://www.cisco.com/warp/public/707/sec_incident_response.shtml . This
   includes instructions for press inquiries regarding Cisco security
   notices. All Cisco security advisories are available at
   http://www.cisco.com/go/psirt.

   This advisory is copyright 2004 by Cisco Systems, Inc. This advisory may
   be redistributed freely after the release date given at the top of the
   text, provided that redistributed copies are complete and unmodified,
   including all date and version information.

     ----------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Comment: PGP Signed by Sharad Ahlawat, Cisco Systems PSIRT

iD8DBQFANOfsezGozzK2tZARAhBdAKDRb1dodVRiDjUtrAQ6DiW42JNkpQCgrwva
kzbm2Gvmn8ALgHyqTJxf7IA=
=A9h2
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ