From: "Cisco Systems Product Security Incident Response Team"
<[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, October 25, 2000 6:30 PM
Subject: Cisco Security Advisory: Cisco IOS HTTP Server Query Vulnerability
| -----BEGIN PGP SIGNED MESSAGE-----
|
| Cisco IOS HTTP Server Query Vulnerability
|
| Revision 1.0
|
| For public release 2000 October 25 at 08:00 US/Pacific (UTC+0700)
| _________________________________________________________________
|
| Summary
|
| A defect in multiple releases of Cisco IOS software will cause a Cisco
| router or switch to halt and reload if the IOS HTTP service is
| enabled, browsing to "http://router-ip/anytext?/" is attempted, and
| the enable password is supplied when requested. This defect can be
| exploited to produce a denial of service (DoS) attack.
|
| The vulnerability, identified as Cisco bug ID CSCdr91706, affects
| virtually all mainstream Cisco routers and switches running Cisco IOS
| software releases 12.0 through 12.1, inclusive. This is not the same
| defect as CSCdr36952.
|
| The vulnerability has been corrected and Cisco is making fixed
| releases available for free to replace all affected IOS releases.
| Customers are urged to upgrade to releases that are not vulnerable to
| this defect as shown in detail below.
|
| This vulnerability can only be exploited if the enable password is
| known or not set.
|
| The complete advisory is available at
| http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml .
|
| Affected Products
|
| The following products are affected if they run a Cisco IOS software
| release that has the defect. To determine if a Cisco product is
| running an affected IOS, log in to the device and issue the command
| show version. Cisco IOS software will identify itself as "Internetwork
| Operating System Software" or "IOS (tm)" software and will display a
| version number. Other Cisco devices either will not have the command
| show version, or will give different output. Compare the version
| number obtained from the router with the versions presented in the
| Software Versions and Fixes section below.
|
| Cisco devices that may be running with affected IOS software releases
| include:
| * Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, ubr900,
| 1000, 1400, 1500, 1600, 1700, 2500, 2600, 3000, 3600, 3800, 4000,
| 4500, 4700, AS5200, AS5300, AS5800, 6400, 7000, 7200, ubr7200,
| 7500, and 12000 series.
| * Most recent versions of the LS1010 ATM switch.
| * The Catalyst 6000 if it is running IOS.
| * The Catalyst 2900XL LAN switch only if it is running IOS.
| * The Cisco DistributedDirector.
|
| For some products, the affected software releases are relatively new
| and may not be available on every device listed above.
|
| If you are not running Cisco IOS software, you are not affected by
| this vulnerability.
|
| Cisco products that do not run Cisco IOS software and are not affected
| by this defect include, but are not limited to:
| * 700 series dialup routers (750, 760, and 770 series) are not
| affected.
| * Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are
| not affected, except for some versions of the Catalyst 2900XL.
| However, optional router modules running Cisco IOS software in
| switch backplanes, such as the RSM module for the Catalyst 5000
| and 5500, are affected (see the Affected Products section above).
| * The Catalyst 6000 is not affected if it is not running IOS.
| * WAN switching products in the IGX and BPX lines are not affected.
| * The MGX (formerly known as the AXIS shelf) is not affected.
| * No host-based software is affected.
| * The Cisco PIX Firewall is not affected.
| * The Cisco LocalDirector is not affected.
| * The Cisco Cache Engine is not affected.
|
| Details
|
| The HTTP server was introduced in IOS release 11.0 to extend router
| management to the worldwide Web. The "?" (question mark) character is
| defined in the HTML specifications as a delimiter for CGI arguments.
| It is also interpreted by the IOS command-line interface as a request
| for help.
|
| As of Cisco IOS Software Release 12.0T, the meaning of a question mark
| when it appears adjacent to a "/" (slash) character cannot be
| determined properly by the URI parser in affected versions of Cisco
| IOS software. When a URI containing "?/" is presented to the HTTP
| service on the router and a valid enable password is supplied, the
| router enters an infinite loop. A watchdog timer expires two minutes
| later and forces the router to crash and reload. The router continues
| to be vulnerable to this defect as long as it is running an affected
| IOS software release and the enable password is known.
|
| This vulnerability may only be exploited if the enable password is not
| set, it is well known, or it can be guessed.
|
| In rare cases, an affected device fails to reload, which means an
| administrator must physically cycle the power to resume operation.
|
| The HTTP server is not enabled by default except on unconfigured Cisco
| model 1003, 1004, and 1005 routers. Once initial access is granted to
| configure the router, the customer may set an enable password, and
| disable or limit access to the HTTP server by changing the
| configuration. Once the new configuration has been saved, the HTTP
| server will not be enabled when the router restarts.
|
| Impact
|
| An affected Cisco IOS device that is operating with the HTTP service
| enabled and is not protected by having the enable password configured
| can be forced to halt for up to two minutes and then reload. The
| vulnerability can be exercised repeatedly, possibly creating a denial
| of service (DOS) attack, unless the service is disabled, the enable
| password is set, or the router is upgraded to a fixed release.
|
| In instances in which a router at a remote location fails to reload,
| an administrator must visit the site to enable the device to recover
| from the defect.
|
| Software Versions and Fixes
|
| The following table summarizes the Cisco IOS software releases
| affected by the defect described in this notice and scheduled dates on
| which the earliest corresponding fixed releases will be available.
| Dates are tentative and subject to change.
|
| Each table row shows the earliest release that contains the fix in the
| "Rebuild", "Interim", or "Maintenance" columns, presented in release
| number order.
|
| A Maintenance Release is the most heavily tested and highly
| recommended release.
|
| A Rebuild Release is constructed from a previous maintenance or
| mainline release and contains a code fix for a specific defect.
| Although it receives less testing than a maintenance release, it is
| built from a previous maintenance release and includes minimum changes
| to address a specific defect.
|
| An Interim Release has much less testing than a maintenance release
| and should be selected only if no other suitable release fixes the
| defect.
|
| In all cases, customers should exercise caution to be certain the
| devices to be upgraded contain sufficient memory and that current
| hardware and software configurations will continue to be supported
| properly by the new release.
|
|
+==========+=================+==============================================
+
| | Major | Description or |
|
| | Release | Platform | Availability of Repaired Releases*
|
|
+==========+=================+===============+==============+===============
+
| |Unaffected Earlier Releases | Rebuild | Interim** | Maintenance
|
|
+==========+=================+===============+==============+===============
+
| |11.0 & | | | |
|
| |earlier, | | |Not |
|
| |all |Numerous |Not vulnerable |vulnerable |Not
vulnerable |
| |variants | | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |11.1 AA, 11.1 | | |
|
| |11.1 |CA, 11.1 CC, |Not vulnerable |Not |Not
vulnerable |
| | |11.1 CT, 11.1 IA | |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |11.2 SA, 11.2 | | |
|
| |11.2 |BC, 11.2 P, 11.2 |Not vulnerable |Not |Not
vulnerable |
| | |F, 11.2 GS, 11.2 | |vulnerable |
|
| | |WA3, 11.2 XA | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |11.3 NA, 11.3 | | |
|
| | |AA, 11.3 DA, | | |
|
| |11.3 |11.3 XA, 11.3 |Not vulnerable |Not |Not
vulnerable |
| | |HA, 11.3 WA, | |vulnerable |
|
| | |11.3 MA, 11.3 DB | | |
|
|
+==========+=================+===============+==============+===============
+
| | 12.0-based Releases | Rebuild | Interim** | Maintenance
|
|
+==========+=================+===============+==============+===============
+
| | |General | | |
|
| |12.0 |Deployment (GD): |Not vulnerable |Not |Not
vulnerable |
| | |all platforms | |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| |12.0DA |xDSL support: |Not vulnerable | Not | Not
vulnerable|
| | |6100, 6200 | |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Core/ISP | | |
|
| |12.0S |support: gsr, |Not vulnerable |Not |Not
vulnerable |
| | |rsp, c7200 | |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| |12.0SC |Cable/broadband | Not |Not |Not
vulnerable |
| | |ISP: ubr7200 |vulnerable |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| |12.0SL |10000 ESR: c10k |Not vulnerable |Not |Not
vulnerable |
| | | | |vulnerable |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early | | |
|
| | |Deployment(ED): | | |
|
| |12.0T |VPN, Distributed | | |
|
| | |director, | | |
|
| | |various | | |Unknown
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |cat8510c, | | |
|
| | |cat8540c, c6msm | | |
|
| | | | |
|12.0(13)W5(19) |
| | |ls1010, | | |
|
| | |cat8510m, | | |
|
| | |cat8540m | |
+---------------+
| | |c5atm, c5atm, | | |
|
| |12.0W5 |c3620, c3640, | | |
|
| | |c4500, c5rsfc, | | |2000-NOV-13
|
| | |c5rsm, c7200, | | |
|
| | |rsp | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |cat2948g, | |
|12.0(10)W5(18e)|
| | |cat4232 | |
+---------------+
| | | | | |2000-NOV-14
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.0XA |(ED): limited | | |12.1(5)
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment |12.1(3a)E4 | |
|
| |12.0XE |(ED): limited +---------------+ |
|
| | |platforms |2000-OCT-24 | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment |12.0(4)XH4 | |
|
| |12.0XH |(ED): limited +---------------+ |
|
| | |platforms |Unknown | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment |12.0(5)XJ6 | |
|
| |12.0XJ |(ED): limited +---------------+ |
|
| | |platforms |Unknown | |
|
|
+==========+=================+===============+==============+===============
+
| | 12.1-based Releases | Rebuild | Interim** | Maintenance
|
|
+==========+=================+===============+==============+===============
+
| | |General | | |12.1(05)
|
| |12.1 |Deployment (GD) | | |
|
| | |candidate: all | |
+---------------+
| | |platforms | | |2000-OCT-30
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Access & Dial |12.1(4)AA1 | |
|
| | |Early Deployment | | |
|
| |12.1AA |(ED): c5200, +---------------+ |
|
| | |c5300, c5800, |Unknown | |
|
| | |dsc-c5800 | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | | | | |12.01(04)DA
|
| |12.1DA |xDSL support: | | |
|
| | |6160, 6260 | |
+---------------+
| | | | | |2000-OCT-30
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | | | | |12.01(4)DB
|
| |12.1DB |xDSL support: | | |
|
| | |c6400 | |
+---------------+
| | | | | |2000-NOV-13
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | | | | |12.01(4)DC
|
| |12.1DC |xDSL NRP | | |
|
| | |support: c6400r | |
+---------------+
| | | | | |2000-NOV-13
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |ELB Early |12.1(3a)E4 | |
|
| | |Deployment (ED): | | |
|
| |12.1E |cat6k, 8500, +---------------+ |
|
| | |ls1010, 7500, |2000-OCT-24 | |
|
| | |7200, 7100 | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Cable/broadband | 12.01(03a)EC1 | |
|
| |12.1EC |Early Deployment +---------------+ |
|
| | |(ED): ubr7200 | Unknown | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |New technology | | 12.1(5.0.x)T | 12.1(5)T
|
| |12.1T |Early Deployment | | |
|
| | |(ED): all |
+--------------+---------------+
| | |platforms | | Unknown | Unknown
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XA |(ED): limited | Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XB |(ED): limited | Not scheduled | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | | Early | | |
|
| | 12.XC |Deployment (ED): |Not scheduled | | 12.1(5)T
|
| | |limited | | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XD |(ED): limited |Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XE |(ED): limited |Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XF |(ED): limited |Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XG |(ED): limited |Not scheduled | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XH |(ED): limited |Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XI |(ED): limited |Not scheduled | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XJ |(ED): limited |Not scheduled | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XL |(ED): limited |Not scheduled | |
|
| | |platforms | | |
|
|
+----------+-----------------+---------------+--------------+---------------
+
| | |Early Deployment | | |
|
| |12.1XP |(ED): limited |Not scheduled | | 12.1(5)T
|
| | |platforms | | |
|
|
+==========+=================+===============+==============+===============
+
| | Notes
|
|
+===========================================================================
+
| |* All dates are estimated and subject to change.
|
|
+---------------------------------------------------------------------------
+
| |** Interim releases are subjected to less rigorous testing than regular
|
| |maintenance releases, and may have serious bugs.
|
|
+===========================================================================
+
|
| Obtaining Fixed Software
|
| Cisco offers free software upgrades to affected customers to remedy
| this vulnerability. Customers with service contracts may upgrade to
| any software release. Customers without contracts may upgrade only
| within a single row of the table above, except that any available
| fixed software release will be provided to any customer who can use it
| and for whom the standard fixed software release is not yet available.
| Customers may install only the feature sets they have purchased.
|
| Not all fixed software may be available as of the release date of this
| notice.
|
| Customers with contracts should obtain upgraded software through
| regular update channels. Most customers can obtain upgrades via the
| Software Center on Cisco's Worldwide Web site at
| http://www.cisco.com/.
|
| Customers without contracts should obtain their upgrades by contacting
| the Cisco Technical Assistance Center (TAC) as follows:
| * +1 800 553 2447 (toll-free call within North America)
| * +1 408 526 7209 (toll call from elsewhere in the world)
| * E-mail: [EMAIL PROTECTED]
|
| Additional contact information for the TAC is on-line at
| http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml, including
| instructions and e-mail addresses for use by non-English speakers.
|
| Give the URL of this notice as evidence of your entitlement to a free
| upgrade.
|
| Free upgrades for noncontract customers must be requested through the
| TAC.
|
| Please do not contact either "[EMAIL PROTECTED]" or
| "[EMAIL PROTECTED]" for software upgrades. You will obtain
| faster results by contacting the TAC directly.
|
| Workarounds
|
| In lieu of an upgrade, the threat may be eliminated or reduced by
| taking any of the following measures:
| * Select and configure strong passwords on networking devices.
| Or
|
| * Disable the HTTP server using the command no ip http server while
| in global configuration mode.
| Or
|
| * If the HTTP server must remain enabled while unrepaired, network
| access to it can be controlled by applying a standard access list
| to the HTTP service itself. For example, if the router's HTTP
| service should be reachable only from a browser running on a
| computer at IP address 10.1.2.3, then use the following commands
| in global configuration mode to create a standard access list and
| apply it to the HTTP server:
| access-list 1 permit 10.1.2.3
| ip http access-class 1
|
| If access list 1 is already in use, then choose another number in
| the range 0-99. The implicit deny rule added to the end of every
| access list will prevent access from other IP addresses.
|
| Or
|
| * Prevent network access to a vulnerable HTTP server by blocking
| traffic in the network path to the server's port with an extended
| access list. Such a list would be applied on an interface of the
| vulnerable router itself or on another Cisco router in the path of
| a potential attack, e.g., applied inbound on the outside interface
| of an edge router. The port number used in the extended access
| list statement must be the default port used by the HTTP server,
| port 80, or equal to whatever value it may have been set via the
| ip http port command. Use this workaround with great care; it
| cannot be recommended confidently without knowledge of specific
| customer network configurations.
|
| Save the resulting configuration in memory so that protection of the
| server is not inadvertently removed after a reload.
|
| Exploitation and Public Announcements
|
| The Cisco PSIRT was alerted to this issue by CORE SDI, which
| discovered the issue during routine security audits on equipment. The
| security audit included a check for common CGI vulnerabilities against
| a Cisco device without a configured password; the audit attempted to
| browse to "http://<router-ip>/cgi-bin/source-help?/", which caused the
| device to crash and reload.
|
| The Cisco PSIRT has received no reports of malicious exploitation of
| this vulnerability.
|
| Status of This Notice: INTERIM
|
| This is an interim notice. Cisco expects the contents of this report
| to change. The reader is warned that this notice may contain
| inaccurate or incomplete information. Although Cisco cannot guarantee
| the accuracy of all statements in this notice, all of the facts have
| been checked to the best of our ability. Cisco anticipates issuing
| monthly updates of this notice until it reaches final status.
|
| Distribution
|
| This notice will be posted at
| http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml.
| In addition to this HTML version on Cisco's worldwide Web site, a text
| version of this notice will be clear-signed with the Cisco PSIRT PGP
| key and posted to the following e-mail addresses and Usenet
| newsgroups:
| * [EMAIL PROTECTED]
| * [EMAIL PROTECTED]
| * [EMAIL PROTECTED]
| * [EMAIL PROTECTED] (which includes the CERT/CC)
| * [EMAIL PROTECTED]
| * [EMAIL PROTECTED]
| * comp.dcom.sys.cisco
| * Various internal Cisco mailing lists
|
| Any updates to this notice will appear on Cisco's worldwide Web
| server. The updates may or may not be announced on mailing lists or
| newsgroups. Users concerned about this problem are encouraged to check
| http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml. for
| any updates.
|
| Revision History
|
| +-------------+-----------+---------------------------------------------+
| |Revision 1.0 |2000-09-29 |Draft for initial public release 2000-10-11. |
| +-------------+-----------+---------------------------------------------+
|
| Cisco Product Security Incident Assistance Process
|
| The Web page at
| http://www.cisco.com/warp/public/707/sec_incident_response.shtml
| describes how to report security vulnerabilities in Cisco products,
| obtain assistance with security incidents, and register to receive
| product security information from Cisco Systems, Inc., including
| instructions for press inquiries regarding Cisco Security Advisories
| and notices. This advisory is Cisco's official public statement
| regarding this vulnerability.
| _________________________________________________________________
|
| This notice is copyright 2000 by Cisco Systems, Inc. This notice may
| be redistributed freely after the release date given at the top of the
| text, provided that redistributed copies are complete and unmodified,
| including all date and version information.
| _________________________________________________________________
|
| -----BEGIN PGP SIGNATURE-----
| Version: PGP 6.0.2
|
| iQEVAwUBOfdAvmiN3BRdFxkbAQHr9Af/Z2Q2C8P7cngCfigUAIg3URxfq5pQmaga
| nFtU7750h1J1DVmKpsROV4joGxmpPQKLPpFQKcs/fQJkEF9Rr9bGcau1NibNeGOf
| RL6o1p2UPSL23FoWmOSbphmKEvzM7VNXWLyqh3zxcOTqLVlr1DVi7AEW7msqonNV
| gL705eNtPZbaPHtlqdkOj9HrU5oFWv5thCvsY3t/kb4ZC9N2WDveD+LzzouNRdNg
| G0SAwHbsyYC9n6IPmJOMUZdWWPik9Z3ShfbyhcFyM7llWWT9ojOV7BzNk4iKI9YP
| +ml+9PgesIcj4u7mun4cRAzshRk9Px9xvNTBhc7moRbFO90+GSU3Ug==
| =V85b
| -----END PGP SIGNATURE-----
|
|
|