Send sanog mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.sanog.org/mailman/listinfo/sanog
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of sanog digest..."
Today's Topics:
1. Cisco Security Advisory: Cisco IOS Software Session
Initiation Protocol Denial of Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
2. Cisco Security Advisory: Cisco 7600 Series Route Switch
Processor 720 with 10 Gigabit Ethernet Uplinks Denial of Service
Vulnerability (Cisco Systems Product Security Incident Response Team)
3. Cisco Security Advisory: Cisco IOS Software Internet Key
Exchange Version 2 Denial of Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
4. Cisco Security Advisory: Cisco IOS Software Network Address
Translation Vulnerabilities
(Cisco Systems Product Security Incident Response Team)
5. Cisco Security Advisory: Cisco IOS Software SSL VPN Denial of
Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
6. Cisco Security Advisory: Cisco IOS Software Crafted IPv6
Packet Denial of Service Vulnerability
(Cisco Systems Product Security Incident Response Team)
----------------------------------------------------------------------
Message: 1
Date: Wed, 26 Mar 2014 12:07:45 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Session
Initiation Protocol Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-sip
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Session Initiation Protocol (SIP) implementation in
Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated,
remote attacker to cause a reload of an affected device. To exploit this
vulnerability, affected devices must be configured to process SIP messages.
Limited Cisco IOS Software and Cisco IOS XE Software releases are affected.
Cisco has released free software updates that address this vulnerability.
There are no workarounds for devices that must run SIP; however, mitigations
are available to limit exposure to this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-sip
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=e0Cj
-----END PGP SIGNATURE-----
------------------------------
Message: 2
Date: Wed, 26 Mar 2014 12:08:19 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco 7600 Series Route
Switch Processor 720 with 10 Gigabit Ethernet Uplinks Denial of
Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks
Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-RSP72010GE
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Cisco 7600 Series Route Switch Processor 720 with 10
Gigabit Ethernet Uplinks models RSP720-3C-10GE and RSP720-3CXL-10GE could allow
an unauthenticated, remote attacker to cause the route processor to reboot or
stop forwarding traffic. The vulnerability is due to an issue in the Kailash
field-programmable gate array (FPGA) versions prior to 2.6.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-RSP72010GE
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=RDpO
-----END PGP SIGNATURE-----
------------------------------
Message: 3
Date: Wed, 26 Mar 2014 12:08:52 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Internet
Key Exchange Version 2 Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software Internet Key Exchange Version 2 Denial of Service
Vulnerability
Advisory ID: cisco-sa-20140326-ikev2
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco
IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote
attacker to cause a reload of the affected device that would lead to a denial
of service (DoS) condition.
The vulnerability is due to how an affected device processes certain malformed
IKEv2 packets. An attacker could exploit this vulnerability by sending
malformed IKEv2 packets to an affected device to be processed. An exploit could
allow the attacker to cause a reload of the affected device that would lead to
a DoS condition.
Although IKEv2 is automatically enabled on Cisco IOS Software and Cisco IOS XE
Software devices when the Internet Security Association and Key Management
Protocol (ISAKMP) is enabled, the vulnerability can be triggered only by
sending a malformed IKEv2 packet.
Only IKEv2 packets can trigger this vulnerability.
Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=XFWb
-----END PGP SIGNATURE-----
------------------------------
Message: 4
Date: Wed, 26 Mar 2014 12:09:26 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Network
Address Translation Vulnerabilities
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software Network Address Translation Vulnerabilities
Advisory ID: cisco-sa-20140326-nat
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
The Cisco IOS Software implementation of the Network Address Translation (NAT)
feature contains two vulnerabilities when translating IP packets that could
allow an unauthenticated, remote attacker to cause a denial of service
condition.
Cisco has released free software updates that address these vulnerabilities.
There are no workarounds to mitigate these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=7Q5K
-----END PGP SIGNATURE-----
------------------------------
Message: 5
Date: Wed, 26 Mar 2014 12:10:00 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software SSL VPN
Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software SSL VPN Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-ios-sslvpn
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of Cisco IOS
Software could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition.
The vulnerability is due to a failure to process certain types of HTTP
requests. To exploit the vulnerability, an attacker could submit crafted
requests designed to consume memory to an affected device. An exploit could
allow the attacker to consume and fragment memory on the affected device. This
may cause reduced performance, a failure of certain processes, or a restart of
the affected device.
Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=1Ixo
-----END PGP SIGNATURE-----
------------------------------
Message: 6
Date: Wed, 26 Mar 2014 12:10:35 -0400
From: Cisco Systems Product Security Incident Response Team
<[email protected]>
To: [email protected]
Subject: [SANOG] Cisco Security Advisory: Cisco IOS Software Crafted
IPv6 Packet Denial of Service Vulnerability
Message-ID: <[email protected]>
Content-Type: Text/Plain; charset="us-ascii"
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-ipv6
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the implementation of the IP version 6 (IPv6) protocol stack
in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated,
remote attacker to cause I/O memory depletion on an affected device that has
IPv6 enabled. The vulnerability is triggered when an affected device processes
a malformed IPv6 packet.
Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=nr53
-----END PGP SIGNATURE-----
------------------------------
_______________________________________________
sanog mailing list
[email protected]
https://lists.sanog.org/mailman/listinfo/sanog
End of sanog Digest, Vol 26, Issue 8
************************************