[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1C00IA-0007gW-00@keop-l.badboys.irmplc.com>
Date: Wed, 25 Aug 2004 17:09:05 +0100
From: "Advisories" <advisories@...plc.com>
To: <bugtraq@...urityfocus.com>
Subject: IRM 010: Top Layer Attack Mitigator IPS 5500 Denial of Service
----------------------------------------------------------------------------
IRM Security Advisory No. 010
Top Layer Attack Mitigator IPS 5500 Denial of Service
Vulnerability Type / Importance: DoS / High
Problem discovered: July 22nd 2004
Vendor contacted: July 23rd 2004
Advisory published: August 25th 2004
----------------------------------------------------------------------------
Abstract:
Top Layer's Attack Mitigator IPS 5500 is an ASIC-based Network Intrusion
Prevention System (NIPS), with blocking and control capabilities against
certain types of cyber attacks. The product's datasheet states that 'Top
Layer's second-generation ASIC technology and patented algorithms integrate
proven stateful analysis techniques with its new 'TopInspect' deep packet
inspection technology and industry-leading DoS attack protection to provide
comprehensive protection from Internet-based and internal threats'.
During a recent security consultancy engagement, IRM discovered that under
certain specific circumstances the Top Layer IPS 5500 series CPU usage
could reach 100% utilisation, where it would not be able to process further
network traffic, and any site protected by the device would become
inaccessible.
Description:
The system under test comprised a web server farm accessible via a load
balancer and protected by an IPS 5500 device. IRM discovered that upon
simulating more than 2000 concurrent HTTP requests to the server farm, the
IPS 5500 device reached a state where it was utilising all its CPU power
and therefore was unable to process standard HTTP traffic.
Tested Versions:
Top Layer Attack Mitigator IPS 5500 running software version 3.11.008
Vendor Response:
Top Layer was notified of this issue on July 22, 2004 by IRM.
A bug exists in Attack Mitigator IPS 5500 software versions earlier than
V3.11.014 that could cause the IPS 5500 device to incorrectly enter an
overload protection mode and negatively impact network traffic. In extreme
cases, this can cause a denial of service condition.
The effect of this bug appears only when the IPS 5500 unit is configured in
a topology where a
high-volume of network packets traverse the IPS unit twice due to a
"one-armed" routing configuration.
The presence of this error condition will exhibit the following when viewing
the IPS5500 Immediate
Security Report: Current System Processor Utilization = 100% and the value
for System CPU Overload
Protection is non-zero.
Vendor & Patch Information:
Top Layer were contacted during the testing and immediately started
investigating the issue. Top Layer then updated the IPS code (to version
3.11.014) which resolved the issue during the timescales of the security
engagement.
The latest IPS 5500 software is available from Top Layer at:
http://www.toplayer.com/content/support/tech_assist/index.jsp
Workarounds:
Top Layer explained that a workaround would be to avoid deploying an IPS
5500 in "one-armed" router configurations.
Credits:
Research & Advisory: Mazin Faour, Louis Garman.
Disclaimer:
All information in this advisory is provided on an 'as is'
basis in the hope that it will be useful. Information Risk Management
Plc is not responsible for any risks or occurrences caused
by the application of this information.
----------------------------------------------------------------------------
Information Risk Management Plc.
22 Buckingham Gate
London
SW1E 6LB
+44 (0)207 808 6420
Powered by blists - more mailing lists