Cisco访问列表漏洞

漏洞信息详情

Cisco访问列表漏洞

漏洞简介

Cisco路由器8.2到9.1版本存在漏洞。远程攻击者在以下情况中可以绕过访问控制列表,就是特定的界面使用扩展的IP访问列表,IP路由缓存启用并且访问列表使用\”established\”关键字。

漏洞公告

This vulnerability can be avoided by either rewriting the extended
access list to not use the “established” keyword, or by configuring
the interface to not use the IP route cache. To disable the IP route
cache, use the configuration command “no ip route-cache”.
Example for a serial interface:
router>enable
Password:
router#configure terminal
Enter configuration commands, one per line.
Edit with DELETE, CTRL/W, and CTRL/U; end with CTRL/Z
interface serial 0
no ip route-cache
^Z
router#write memoryThis vulnerability is fixed in Cisco software releases 8.3 (update 5.10),
9.0 (update 2.5), 9.1 (update 1.1) and in all later releases. Customers
who are using software release 8.2 and do not want to upgrade to a later
release should contact Cisco’s Technical Assistance Center (TAC) at
800-553-2447 (Internet: tac@cisco.com) for more information.
The following interim releases are available via anonymous FTP from
ftp.cisco.com (131.108.1.111).
Note: this FTP server will not allow filenames to be listed or matched
with wildcards. You also cannot request the file by its full pathname.
You must first cd to the desired directory (beta83_dir, beta90_dir, or
beta91_dir) and then request the file desired (gs3-bfx.83-5.10, etc.).
Release (Update) Filename Size Checksum
8.3 (5.10) /beta83_dir/gs3-bfx.83-5.10 1234696 02465 1206
9.0 (2.5) /beta90_dir/gs3-bfx.90-2.5 1705364 47092 1666
9.1 (1.1) /beta91_dir/gs3-k.91-1.1 2005548 59407 1959

参考网址

来源:CERT/CC Advisory: CA-1992-20
名称: CA-1992-20
链接:http://www.cert.org/advisories/CA-1992-20.html

来源: BID
名称: 53
链接:http://www.securityfocus.com/bid/53

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享