I Just found this out from SANS Critical Vulnerability Analysis...

HIGH: Cisco IOS SSH Denial of Service Vulnerability
 
Affected Products:
Cisco IOS versions 12.0S, 12.0ST, 12.1T, 12.1E, 12.1EA, 12.2, 12.2T,
12.2S. All products running these versions of IOS are vulnerable if
the SSH server feature is enabled.
 
Description:
Cisco routers and Catalyst switches running affected versions of
IOS will reboot upon receiving malicious traffic sent by Rapid7's
SSHredder SSH test suite. Most Cisco devices will resume service
following the reboot, but can be rendered unavailable for several
minutes while the device reloads. The exception is the Cisco 3550,
which requires a manual reset following a successful attack.
 
Risk: Cisco routers and switches offering SSH services can be rebooted
(repeatedly) by a remote unauthenticated attacker.
 
Deployment: Significant.
The affected IOS versions are widely deployed throughout the Internet
infrastructure.
 
Ease of Exploitation: Trivial.
Exploit code exists and is publicly available.
 
Status: This vulnerability has been confirmed by Cisco. The Cisco
advisory provides a patch release schedule for the various IOS
versions.
References:
Cisco Advisory:
http://www.cisco.com/warp/public/707/ssh-packet-suite-vuln.shtml
 
Rapid7 SSHredder Test Suite:
http://www.rapid7.com/perl/DownloadRequest.pl?PackageChoice=666
 
Council Site Actions:
The majority of the council sites do not use the SSH feature of Cisco
IOS. Furthermore, many of these sites stated they block in-bound SSH
connections at their security perimeters.  The few sites that run SSH
on affected devices plan to deploy the fixed version of the software
when it becomes available later this month.
 
One site has an extensive implementation of the SSH feature in IOS.
They block in-bound SSH at the perimeters but are concerned that
the vulnerability may be fodder for a new worm. Thus, they are
investigating the likelihood and difficulty factor of such a worm.
They do not have plans to turn off SSH or perform an immediate upgrade.
However, they are prepared with scripts that will turn off SSH,
if needed.



-RD-



Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=60996&t=60996
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to