Send sanog mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.sanog.org/mailman/listinfo/sanog
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of sanog digest..."
Today's Topics:
1. Cisco Security Advisory: Cisco IOS Software Zone-Based Policy
Firewall Session Initiation Protocol Inspection Denial of Service
Vulnerability (Cisco Systems Product Security Incident Response Team)
2. Cisco Security Advisory: Cisco IOS Software Protocol
Translation Vulnerability
(Cisco Systems Product Security Incident Response Team)
3. Cisco Security Advisory: Cisco IOS Software IP Service Level
Agreement Vulnerability
(Cisco Systems Product Security Incident Response Team)
4. Cisco Security Advisory: Cisco IOS Software Smart Install
Denial of Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
5. Cisco Security Advisory: Cisco IOS Software Internet Key
Exchange Vulnerability
(Cisco Systems Product Security Incident Response Team)
6. Cisco Security Advisory: Cisco IOS Software Network Address
Translation Vulnerability
(Cisco Systems Product Security Incident Response Team)
7. Cisco Security Advisory: Cisco IOS Software Resource
Reservation Protocol Denial of Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
----------------------------------------------------------------------
Message: 1
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software
Zone-Based Policy Firewall Session Initiation Protocol Inspection
Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Zone-Based Policy Firewall Session Initiation
Protocol Inspection Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-cce
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Cisco IOS Software contains a memory leak vulnerability that could be
triggered through the processing of malformed Session Initiation
Protocol (SIP) messages. Exploitation of this vulnerability could
cause an interruption of services. Only devices that are configured
for SIP inspection are affected by this vulnerability.
Cisco has released free software updates that address this
vulnerability. There are no workarounds for devices that must run SIP
inspection.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd0ACgkQUddfH3/BbTo1NQD+JTLByafJPlfucXQ7tGEHnYy5
vVv944CH2/B0vC3+AHUA/Aw9dc2MzCzkrKELNu9FQDBFkr5lIhdY9i942xPDfHKQ
=6IL2
-----END PGP SIGNATURE-----
------------------------------
Message: 2
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Protocol
Translation Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Protocol Translation Vulnerability
Advisory ID: cisco-sa-20130327-pt
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Cisco IOS Software Protocol Translation (PT) feature contains a
vulnerability that could allow an unauthenticated, remote attacker to
cause a denial of service (DoS) condition.
Cisco has released free software updates that address this
vulnerability. Workarounds that mitigate this vulnerability are
available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-pt
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd4ACgkQUddfH3/BbTr/hQEAhB32OjahAaNFUbeYsZloNqCX
C9JHEqRP4k4Y27LcWZUA+wTwW0yKpKzQ9+ZDvaWYiXtL1iSvOhlSjS178A3kMIhb
=JlLG
-----END PGP SIGNATURE-----
------------------------------
Message: 3
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software IP
Service Level Agreement Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software IP Service Level Agreement Vulnerability
Advisory ID: cisco-sa-20130327-ipsla
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Cisco IOS Software implementation of the IP Service Level
Agreement (IP SLA) feature contains a vulnerability in the validation
of IP SLA packets that could allow an unauthenticated, remote attacker
to cause a denial of service (DoS) condition.
Cisco has released free software updates that address this
vulnerability. Mitigations for this vulnerability are available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ipsla
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd0ACgkQUddfH3/BbTp8QwD+IPK7Dzz7B0uga/FtZKjYU9XC
ik2D1EIVMDWcFNYovn8A/i2M+COtgQr9j/7CuMRdNfnAoA65JOxRHu4NTW7cdZoo
=w51Y
-----END PGP SIGNATURE-----
------------------------------
Message: 4
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Smart
Install Denial of Service Vulnerability
Message-ID:
<[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Smart Install Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-smartinstall
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Smart Install client feature in Cisco IOS Software contains a
vulnerability that could allow an unauthenticated, remote attacker to
cause a denial of service (DoS) condition on an affected device.
Affected devices that are configured as Smart Install clients are
vulnerable.
Cisco has released free software updates that address this
vulnerability. There are no workarounds for devices that have the
Smart Install client feature enabled.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd4ACgkQUddfH3/BbToUsAD+NSDtaCAvOzfjmsqhxVZN6Uy+
ceAxXTPCp6M0n8yGk0sA/1uJk8CWE1yjCtTu1IDGX8K/SUvWFEUi0pqFyKfKVFEa
=eRMY
-----END PGP SIGNATURE-----
------------------------------
Message: 5
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Internet
Key Exchange Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Internet Key Exchange Vulnerability
Advisory ID: cisco-sa-20130327-ike
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Cisco IOS Software Internet Key Exchange (IKE) feature contains a
denial of service (DoS) vulnerability.
Cisco has released free software updates that address this
vulnerability. Workarounds that mitigate this vulnerability are not
available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd0ACgkQUddfH3/BbTovwQD8DwYcxZks8h9lxLcC9YX0Stal
GfVltUM7jduv3M2tsQgBAIdGU+jBhC8Ct4i/0idzEkoX6o8TAK3EbcUqZt9QjK6F
=Viuu
-----END PGP SIGNATURE-----
------------------------------
Message: 6
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Network
Address Translation Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerability
Advisory ID: cisco-sa-20130327-nat
Revision 1.0
For Public Release 2013 March 27 10:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Cisco IOS Software implementation of the virtual routing and
forwarding (VRF) aware network address translation (NAT) feature
contains a vulnerability when translating IP packets that could allow
an unauthenticated, remote attacker to cause a denial of service (DoS)
condition.
Cisco has released free software updates that address this
vulnerability. Workarounds that mitigate this vulnerability are not
available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd0ACgkQUddfH3/BbTrndAD/Qxm/suF3S/US+6bDND+/OKB3
9KpBW/wUPVC2+87IFRQBAIXFrAjFqnbmmBAKFEVZztVhRN1TlOW9JL7mKd6SXwZw
=jAQM
-----END PGP SIGNATURE-----
------------------------------
Message: 7
Date: Wed, 27 Mar 2013 12:13:56 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Resource
Reservation Protocol Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS Software Resource Reservation Protocol Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130327-rsvp
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Resource Reservation Protocol (RSVP) feature in Cisco IOS Software
and Cisco IOS XE Software contains a vulnerability when used on a
device that has Multiprotocol Label Switching with Traffic Engineering
(MPLS-TE) enabled. Successful exploitation of the vulnerability could
allow an unauthenticated, remote attacker to cause a reload of the
affected device. Repeated exploitation could result in a sustained
denial of service (DoS) condition.
Cisco has released free software updates that address this
vulnerability. There are no workarounds available to mitigate this
vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-rsvp
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories
address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software
Security Advisory lists the Cisco IOS Software releases that correct
the vulnerability or vulnerabilities detailed in the advisory as well
as the Cisco IOS Software releases that correct all Cisco IOS Software
vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication" at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlFQcd4ACgkQUddfH3/BbTqZ+AD/SPWuHu+4uf/xKA+RAbRbCZxd
H9SFakcWJIPsy9TYjBABAI6/LmnQ9FrB1PHcVABckjYOnB+9JUd03ynxrsFPzIQS
=W+Lt
-----END PGP SIGNATURE-----
------------------------------
_______________________________________________
sanog mailing list
[email protected]
https://lists.sanog.org/mailman/listinfo/sanog
End of sanog Digest, Vol 14, Issue 8
************************************