lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1C00IA-0007gW-00@keop-l.badboys.irmplc.com>
Date: Wed, 25 Aug 2004 17:09:05 +0100
From: "Advisories" <advisories@...plc.com>
To: <bugtraq@...urityfocus.com>
Subject: IRM 010: Top Layer Attack Mitigator IPS 5500 Denial of Service


----------------------------------------------------------------------------

IRM Security Advisory No. 010

Top Layer Attack Mitigator IPS 5500 Denial of Service

Vulnerability Type / Importance: DoS / High

Problem discovered: 	July 22nd 2004
Vendor contacted:    	July 23rd 2004
Advisory published:  	August 25th 2004

----------------------------------------------------------------------------


Abstract:

Top Layer's Attack Mitigator IPS 5500 is an ASIC-based Network Intrusion
Prevention System (NIPS), with blocking and control  capabilities against
certain types of cyber attacks. The product's datasheet states that 'Top
Layer's second-generation ASIC  technology and patented algorithms integrate
proven stateful analysis techniques with its new 'TopInspect' deep packet
inspection technology and industry-leading DoS attack protection to provide
comprehensive protection from Internet-based and  internal threats'. 

During a recent security consultancy engagement, IRM discovered that under
certain specific circumstances the Top Layer IPS  5500 series CPU usage
could reach 100% utilisation, where it would not be able to process further
network traffic, and any  site protected by the device would become
inaccessible.  


Description:

The system under test comprised a web server farm accessible via a load
balancer and protected by an IPS 5500 device. IRM  discovered that upon
simulating more than 2000 concurrent HTTP requests to the server farm, the
IPS 5500 device reached a  state where it was utilising all its CPU power
and therefore was unable to process standard HTTP traffic.  


Tested Versions:

Top Layer Attack Mitigator IPS 5500 running software version 3.11.008


Vendor Response:

Top Layer was notified of this issue on July 22, 2004 by IRM.   

A bug exists in Attack Mitigator IPS 5500 software versions earlier than
V3.11.014 that could cause the IPS 5500 device to  incorrectly enter an
overload protection mode and negatively impact network traffic.  In extreme
cases, this can cause a  denial of service condition.

The effect of this bug appears only when the IPS 5500 unit is configured in
a topology where a 
high-volume of network packets traverse the IPS unit twice due to a
"one-armed" routing configuration.

The presence of this error condition will exhibit the following when viewing
the IPS5500 Immediate 
Security Report: Current System Processor Utilization = 100% and the value
for System CPU Overload 
Protection is non-zero.

 
Vendor & Patch Information:

Top Layer were contacted during the testing and immediately started
investigating the issue. Top Layer then updated the IPS  code (to version
3.11.014) which resolved the issue during the timescales of the security
engagement. 

The latest IPS 5500 software is available from Top Layer at:
http://www.toplayer.com/content/support/tech_assist/index.jsp


Workarounds:

Top Layer explained that a workaround would be to avoid deploying an IPS
5500 in "one-armed" router configurations.


Credits:

Research & Advisory: Mazin Faour, Louis Garman.   


Disclaimer:

All information in this advisory is provided on an 'as is' 
basis in the hope that it will be useful. Information Risk Management 
Plc is not responsible for any risks or occurrences caused 
by the application of this information.


----------------------------------------------------------------------------

Information Risk Management Plc.
22 Buckingham Gate 
London 
SW1E 6LB
+44 (0)207 808 6420



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ