Send sanog mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sanog.org/mailman/listinfo/sanog
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of sanog digest..."


Today's Topics:

   1. Cisco Security Advisory: Cisco IOS Software Session
      Initiation Protocol Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   2. Cisco Security Advisory: Cisco 7600 Series Route Switch
      Processor 720 with 10 Gigabit Ethernet Uplinks Denial of  Service
      Vulnerability (Cisco Systems Product Security Incident Response Team)
   3. Cisco Security Advisory: Cisco IOS Software Internet Key
      Exchange Version 2 Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   4. Cisco Security Advisory: Cisco IOS Software Network Address
      Translation Vulnerabilities
      (Cisco Systems Product Security Incident Response Team)
   5. Cisco Security Advisory: Cisco IOS Software SSL VPN Denial        of
      Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)
   6. Cisco Security Advisory: Cisco IOS Software Crafted IPv6
      Packet Denial of Service Vulnerability
      (Cisco Systems Product Security Incident Response Team)


----------------------------------------------------------------------

Message: 1
Date: Wed, 26 Mar 2014 12:07:45 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Session
        Initiation Protocol Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

Advisory ID: cisco-sa-20140326-sip

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary
=======

A vulnerability in the Session Initiation Protocol (SIP) implementation in 
Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, 
remote attacker to cause a reload of an affected device. To exploit this 
vulnerability, affected devices must be configured to process SIP messages. 
Limited Cisco IOS Software and Cisco IOS XE Software releases are affected.

Cisco has released free software updates that address this vulnerability. 

There are no workarounds for devices that must run SIP; however, mitigations 
are available to limit exposure to this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-sip

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=e0Cj
-----END PGP SIGNATURE-----


------------------------------

Message: 2
Date: Wed, 26 Mar 2014 12:08:19 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco 7600 Series Route
        Switch  Processor 720 with 10 Gigabit Ethernet Uplinks Denial of
        Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks 
Denial of Service Vulnerability

Advisory ID: cisco-sa-20140326-RSP72010GE

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary
=======

A vulnerability in the Cisco 7600 Series Route Switch Processor 720 with 10 
Gigabit Ethernet Uplinks models RSP720-3C-10GE and RSP720-3CXL-10GE could allow 
an unauthenticated, remote attacker to cause the route processor to reboot or 
stop forwarding traffic. The vulnerability is due to an issue in the Kailash 
field-programmable gate array (FPGA) versions prior to 2.6.

Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-RSP72010GE

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=RDpO
-----END PGP SIGNATURE-----


------------------------------

Message: 3
Date: Wed, 26 Mar 2014 12:08:52 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Internet
        Key     Exchange Version 2 Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Internet Key Exchange Version 2 Denial of Service 
Vulnerability

Advisory ID: cisco-sa-20140326-ikev2

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary
=======

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco 
IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote 
attacker to cause a reload of the affected device that would lead to a denial 
of service (DoS) condition.

The vulnerability is due to how an affected device processes certain malformed 
IKEv2 packets. An attacker could exploit this vulnerability by sending 
malformed IKEv2 packets to an affected device to be processed. An exploit could 
allow the attacker to cause a reload of the affected device that would lead to 
a DoS condition.

Although IKEv2 is automatically enabled on Cisco IOS Software and Cisco IOS XE 
Software devices when the Internet Security Association and Key Management 
Protocol (ISAKMP) is enabled, the vulnerability can be triggered only by 
sending a malformed IKEv2 packet.

Only IKEv2 packets can trigger this vulnerability.

Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=XFWb
-----END PGP SIGNATURE-----


------------------------------

Message: 4
Date: Wed, 26 Mar 2014 12:09:26 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Network
        Address Translation Vulnerabilities
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Network Address Translation Vulnerabilities

Advisory ID: cisco-sa-20140326-nat

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary

The Cisco IOS Software implementation of the Network Address Translation (NAT) 
feature contains two vulnerabilities when translating IP packets that could 
allow an unauthenticated, remote attacker to cause a denial of service 
condition.

Cisco has released free software updates that address these vulnerabilities.
There are no workarounds to mitigate these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=7Q5K
-----END PGP SIGNATURE-----


------------------------------

Message: 5
Date: Wed, 26 Mar 2014 12:10:00 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software SSL VPN
        Denial  of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software SSL VPN Denial of Service Vulnerability

Advisory ID: cisco-sa-20140326-ios-sslvpn

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary
=======

A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of Cisco IOS 
Software could allow an unauthenticated, remote attacker to cause a denial of 
service (DoS) condition.

The vulnerability is due to a failure to process certain types of HTTP 
requests. To exploit the vulnerability, an attacker could submit crafted 
requests designed to consume memory to an affected device. An exploit could 
allow the attacker to consume and fragment memory on the affected device. This 
may cause reduced performance, a failure of certain processes, or a restart of 
the affected device.

Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=1Ixo
-----END PGP SIGNATURE-----


------------------------------

Message: 6
Date: Wed, 26 Mar 2014 12:10:35 -0400
From: Cisco Systems Product Security Incident Response Team
        <[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Crafted
        IPv6    Packet Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20140326-ipv6

Revision 1.0

For Public Release 2014 March 26 16:00  UTC (GMT)

Summary
=======

A vulnerability in the implementation of the IP version 6 (IPv6) protocol stack 
in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, 
remote attacker to cause I/O memory depletion on an affected device that has 
IPv6 enabled. The vulnerability is triggered when an affected device processes 
a malformed IPv6 packet.

Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled 
publication includes six Cisco Security Advisories. All advisories address 
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security 
Advisory lists the Cisco IOS Software releases that correct the vulnerability 
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 
bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS 
Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=nr53
-----END PGP SIGNATURE-----


------------------------------

_______________________________________________
sanog mailing list
[email protected]
https://lists.sanog.org/mailman/listinfo/sanog

End of sanog Digest, Vol 26, Issue 8
************************************

Reply via email to