Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products

Document ID: 109444

Advisory ID: cisco-sa-20090908-tcp24

http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml

Revision 1.0

For Public Release 2009 September 8 1700 UTC (GMT)

Please provide your feedback on this document.

Summary

Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.

In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.

Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.


Affected 12.4-Based Releases

First Fixed Release

Recommended Release

12.4

12.4(18d)

12.4(23a)

12.4(25)

12.4(25b)

12.4(23b)

12.4GC

12.4(22)GC1

12.4(24)GC1

12.4(24)GC1

12.4JA

12.4(16b)JA1

12.4(21a)JA


12.4JDA

12.4(10b)JDA3


12.4JDC

12.4(10b)JDC


12.4JDD

12.4(10b)JDD


12.4JK

12.4(3)JK4


12.4JL

12.4(3)JL1


12.4JMA

Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory


12.4JMB

Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory


12.4JX

12.4(21a)JX


12.4MD

12.4(11)MD7

12.4(15)MD2

12.4(22)MD

12.4(11)MD9

12.4(15)MD3

12.4(22)MD1

12.4MDA

12.4(22)MDA

12.4(22)MDA1

12.4MR

12.4(19)MR2

12.4(19)MR3

12.4SW

12.4(15)SW3

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4T

12.4(5)T5e

12.4(15)T6a

12.4(22)T1

12.4(20)T2

12.4(24)T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XA

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XB

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XC

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XD

12.4(4)XD12

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XE

12.4(6)XE4

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XF

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XG

12.4(9)XG4

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XJ

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XK

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XL

12.4(15)XL4


12.4XM

12.4(15)XM3

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XN

Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory


12.4XP

Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory


12.4XQ

12.4(15)XQ2

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XR

12.4(15)XR4

12.4(22)XR

12.4(15)XR7

12.4XT

Vulnerable; first fixed in 12.4T

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XV

Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory


12.4XW

12.4(11)XW10

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XY

12.4(15)XY4

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4XZ

12.4(15)XZ2

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4YA

12.4(20)YA2

12.4(15)T10

12.4(20)T4

12.4(22)T3

12.4(24)T2; Available on 23-OCT-2009

12.4YB

12.4(22)YB

12.4(22)YB4

12.4YD

12.4(22)YD

12.4(22)YD1

12.4YE

12.4(22)YE

12.4(22)YE1




_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to