SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco ASR Router Vendors:   Cisco
Cisco IOS XR on ASR 9000 Routers BVI Interface Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1032139
SecurityTracker URL:  http://securitytracker.com/id/1032139
CVE Reference:   CVE-2015-0695   (Links to External Site)
Date:  Apr 15 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco IOS XR on ASR Routers. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted IPv4 packets through the target device that is configured to route the packets via the bridge-group virtual interface (BVI) to cause the target network processor chip to lockup and eventually reload.

Systems configured to route traffic via the BVI and with the Unicast Reverse Path Forwarding (uRPF), policy-based routing (PBR), quality of service (QoS), or access control list (ACL) features enabled are affected.

Cisco Aggregation Services Routers (ASR) 9000 Series routers with Typhoon-based line cards are affected.

The Cisco ASR 9001 and Cisco ASR 9001-S Routers are affected.

IOS XR prior to version 4.3.0 is not affected.

The vendor has assigned bug ID CSCur62957 to this vulnerability.

Impact:   A remote user can cause the target network processor chip to lockup and eventually reload.
Solution:   The vendor has issued a fix:

For 4.3.4: asr9k-px-4.3.4.CSCur62957.pie
For 5.1.2: asr9k-px-5.1.2.CSCur62957.pie
For 5.1.3: asr9k-px-5.1.3.CSCur62957.pie
For 5.2.2: asr9k-px-5.2.2.CSCur62957.pie
For 5.3.0: asr9k-px-5.3.0.CSCur62957.pie

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents

Subject:  Cisco Security Advisory: Cisco IOS XR Software BVI Routed Packet Denial of Service Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS XR Software BVI Routed Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20150415-iosxr

Revision 1.0

For Public Release 2015 April 15 16:00  UTC (GMT)

Summary
=======

A vulnerability in the packet-processing code of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers (ASR) could allow an unauthenticated, remote attacker to cause a lockup and eventual reload of a network processor chip and the line card that is processing traffic. Only Typhoon-based line cards on Cisco ASR 9000 Series Aggregation Services Routers are affected by this vulnerability.

The vulnerability is due to improper processing of packets that are routed via the bridge-group virtual interface (BVI) when any of the following features are configured: Unicast Reverse Path Forwarding (uRPF), policy-based routing (PBR), quality of service (QoS), or access control lists (ACLs). An attacker could exploit this vulnerability by sending IPv4 packets through an affected device that is configured to route them via the BVI interface. A successful exploit could allow the attacker to cause a lockup and eventual reload of a network processor chip and the line card that is processing traffic, leading to a denial of service (DoS) condition.

Cisco has released free software updates that address this vulnerability. There are no workarounds to address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=nnUg
-----END PGP SIGNATURE-----
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC