Send sanog mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sanog.org/mailman/listinfo/sanog
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of sanog digest..."


Today's Topics:

   1. Cisco Security Advisory: Cisco IOS Software Network Address
      Translation Vulnerabilities
      (Cisco Systems Product Security Incident Response Team)
   2. Cisco Security Advisory: Cisco IOS Software IPv6 Virtual
      Fragmentation Reassembly Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   3. Cisco Security Advisory: Cisco IOS Software Queue Wedge
      Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   4. Cisco Security Advisory: Cisco IOS Software Zone-Based
      Firewall and Content Filtering Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   5. Cisco Security Advisory: Cisco IOS Software DHCP Denial of
      Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   6. Cisco Security Advisory: Cisco IOS Software Multicast     Network
      Time Protocol Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   7. Cisco Security Advisory: Cisco IOS Software Internet Key
      Exchange Memory Leak Vulnerability
      (Cisco Systems Product Security Incident Response Team)


----------------------------------------------------------------------

Message: 1
Date: Wed, 25 Sep 2013 12:22:39 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Network
        Address Translation Vulnerabilities
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software Network Address Translation Vulnerabilities

Advisory ID: cisco-sa-20130925-nat

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

The Cisco IOS Software implementation of the network address translation (NAT) 
feature contains three vulnerabilities when translating IP packets that could 
allow an unauthenticated, remote attacker to cause a denial of service (DoS) 
condition.

Cisco has released free software updates that address these vulnerabilities. 
Workarounds that mitigate these vulnerabilities are not available.

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z0ACgkQUddfH3/BbTqtUwD/fmE/9ONyzNjrIDni2UklV3M2
8ATQxEVFt1L3ZYUlyA4A/Ax+e0PiSL6ojL9bSgGIM7Y//+c7ga9nsau2mV5r/mhM
=u9YC
-----END PGP SIGNATURE-----


------------------------------

Message: 2
Date: Wed, 25 Sep 2013 12:21:58 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software IPv6
        Virtual Fragmentation Reassembly Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service 
Vulnerability

Advisory ID: cisco-sa-20130925-ipv6vfr

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the implementation of the virtual fragmentation reassembly 
(VFR) feature for IP version 6 (IPv6) in Cisco IOS Software could allow an 
unauthenticated, remote attacker to cause an affected device to hang or reload, 
resulting in a denial of service (DoS) condition.

The vulnerability is due to a race condition while accessing the reassembly 
queue for IPv6 fragments. An attacker could exploit this vulnerability by 
sending a crafted stream of valid IPv6 fragments. Repeated exploitation may 
result in a sustained DoS condition.

Cisco has released free software updates that address this vulnerability. There 
are no workarounds for this vulnerability.

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ipv6vfr

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z0ACgkQUddfH3/BbTon8QD+KjqV+g6xJtyPO04NuZLuUhZf
nL+yvKaN2zd0d8DNTXYA/joTFXuponHnVUNni/h5NjU2MaS/ZphGQpuinPUZK5I4
=+5KL
-----END PGP SIGNATURE-----


------------------------------

Message: 3
Date: Wed, 25 Sep 2013 12:24:07 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Queue
        Wedge   Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software Queue Wedge Denial of Service Vulnerability

Advisory ID: cisco-sa-20130925-wedge

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the T1/E1 driver queue implementation of Cisco IOS Software 
could allow an unauthenticated, remote attacker to cause an interface wedge 
condition, which could lead to loss of connectivity, loss of routing protocol 
adjacency, and could result in a denial of service (DoS) scenario.

The vulnerability is due to incorrect implementation of the T1/E1 driver queue. 
An attacker could exploit this vulnerability by sending bursty traffic through 
the affected interface driver. Repeated exploitation could cause a DoS 
condition.

Workarounds to mitigate this vulnerability are available.

Cisco has released free software updates that address this vulnerability. This 
advisory is available at the following link:  
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-wedge

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z4ACgkQUddfH3/BbTpEGAD/Ss7zOJllV49QzpGTtRmbXsjK
bgypwesmtU9UdOC39kUA/1FGKQ1kn08R7dJ2PcbbLo8PP0OCtQrSyxTeBtmcIsHw
=xChY
-----END PGP SIGNATURE-----


------------------------------

Message: 4
Date: Wed, 25 Sep 2013 12:23:10 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software
        Zone-Based      Firewall and Content Filtering Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability

Advisory ID: cisco-sa-20130925-cce

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the Zone-Based Firewall (ZBFW) component of Cisco IOS 
Software could allow an unauthenticated, remote attacker to cause an affected 
device to hang or reload.

The vulnerability is due to improper processing of specific HTTP packets when 
the device is configured for either Cisco IOS Content Filtering or HTTP 
application layer gateway (ALG) inspection. An attacker could exploit this 
vulnerability by sending specific HTTP packets through an affected device. An 
exploit could allow the attacker to cause an affected device to hang or reload.

Cisco has released free software updates that address this vulnerability. 

Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-cce

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6ZwACgkQUddfH3/BbTrfJAEAhPGE6zVhhuxL2YSSqZ9jQ7iB
WSXFXha2WZL3zp//WtgA/3B0mrj1OwGNpUouOUDM20cvsxM8RGUUGJqn/UDgbdi4
=yiSp
-----END PGP SIGNATURE-----


------------------------------

Message: 5
Date: Wed, 25 Sep 2013 12:24:34 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software DHCP
        Denial of       Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software DHCP Denial of Service Vulnerability

Advisory ID: cisco-sa-20130925-dhcp

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the DHCP implementation of Cisco IOS Software and Cisco IOS 
XE Software could allow an unauthenticated, remote attacker to cause a denial 
of service (DoS) condition.

The vulnerability occurs during the parsing of crafted DHCP packets. An 
attacker could exploit this vulnerability by sending crafted DHCP packets to an 
affected device that has the DHCP server or DHCP relay feature enabled. An 
exploit could allow the attacker to cause a reload of an affected device.

Cisco has released free software updates that address this vulnerability. There 
are no workarounds to this vulnerability. 

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-dhcp

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z0ACgkQUddfH3/BbToKcAD/Y0gUqLxw1mMs8yqeoREI7H7x
/bU2ckuJKhhzJmmqpjEA/3ekjyVjTXoLRR9vQrYnAeJSE4opTRXYTlJtZesv4tIw
=zzbX
-----END PGP SIGNATURE-----


------------------------------

Message: 6
Date: Wed, 25 Sep 2013 12:23:38 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Multicast
        Network Time Protocol Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software Multicast Network Time Protocol Denial of Service 
Vulnerability

Advisory ID: cisco-sa-20130925-ntp

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the implementation of the Network Time Protocol (NTP) 
feature in Cisco IOS Software could allow an unauthenticated, remote attacker 
to cause an affected device to reload, resulting in a denial of service (DoS) 
condition.

The vulnerability is due to the improper handling of multicast NTP packets that 
are sent to an affected device encapsulated in a Multicast Source Discovery 
Protocol (MSDP) Source-Active (SA) message from a configured MSDP peer. An 
attacker could exploit this vulnerability by sending multicast NTP packets to 
an affected device. Repeated exploitation could result in a sustained DoS 
condition.

Cisco has released free software updates that address this vulnerability. A 
workaround is available to mitigate this vulnerability.

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ntp

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z4ACgkQUddfH3/BbTrDQAD/ZDkeJZRsPNylydioU1nw+yJ+
8frzFaXjO3g0qqocPjMA/R95PEhewfO2A29QwIyGKLw52QkiSt1sd6e2YsDIN84B
=Xa3k
-----END PGP SIGNATURE-----


------------------------------

Message: 7
Date: Wed, 25 Sep 2013 12:25:03 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Internet
        Key     Exchange Memory Leak Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability

Advisory ID: cisco-sa-20130925-ike

Revision 1.0

For Public Release 2013 September 25 16:00  UTC (GMT)
- ----------------------------------------------------------------------

Summary
=======

A vulnerability in the Internet Key Exchange (IKE) protocol of Cisco IOS 
Software and Cisco IOS XE Software could allow an unauthenticated, remote 
attacker to cause a memory leak that could lead to a device reload.

The vulnerability is due to incorrect handling of malformed IKE packets by the 
affected software. An attacker could exploit this vulnerability by sending 
crafted IKE packets to a device configured with features that leverage IKE 
version 1 (IKEv1).

Although IKEv1 is automatically enabled on a Cisco IOS Software and Cisco IOS 
XE Software when IKEv1 or IKE version 2 (IKEv2) is configured, the 
vulnerability can be triggered only by sending a malformed IKEv1 packet.

In specific conditions, normal IKEv1 packets can also cause an affected release 
of Cisco IOS Software to leak memory.

Only IKEv1 is affected by this vulnerability.

An exploit could cause Cisco IOS Software not to release allocated memory, 
causing a memory leak. A sustained attack may result in a device reload.

Cisco has released free software updates that address this vulnerability. There 
are no workarounds to mitigate this vulnerability. 

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ike

Note: The September 25, 2013, Cisco IOS Software Security Advisory bundled 
publication includes eight Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the September 
2013 bundled publication.

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication" at the following link: 
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep13.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJC6Z0ACgkQUddfH3/BbTqlXwEAgh4+BJHc44EE50FqW2sNNo57
l9ZxzwJvzF2Tju/Fa18A/2MRGlAmkyvQZTQ/FT/j9wgW+epGNKAZ+XOL7Kwy6Luz
=A0a+
-----END PGP SIGNATURE-----


------------------------------

_______________________________________________
sanog mailing list
[email protected]
https://lists.sanog.org/mailman/listinfo/sanog

End of sanog Digest, Vol 20, Issue 6
************************************

Reply via email to