Date: 15 December 2000
References: ESB-2004.0234
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2000.398 -- Cisco Security Advisory
Cisco Catalyst SSH protocol mismatch vulnerability
15 December 2000
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Catalyst
Vendor: Cisco
Platform: Cisco Catalyst 6000, 5000, 4000 Switches
versions 6.1(1), 6.1(1a) and 6.1(1b)
Impact: Denial of Service
Access Required: Remote
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Cisco Catalyst SSH protocol mismatch vulnerability
Revision 1.0
For release 2000 December 13 10:00 AM US/Pacific (UTC+0700)
------------------------------------------------------------------------
Summary
Non-SSH connection attempts to an enabled SSH service on a Cisco Catalyst
6000, 5000, or 4000 switch might cause a "protocol mismatch" error,
resulting in a supervisor engine failure. The supervisor engine failure
causes the switch to fail to pass traffic and reboots the switch. This
problem is resolved in software release 6.1(1c). Due to a very limited
number of customer downloads, Cisco has chosen to notify affected customers
directly.
This vulnerability has been assigned Cisco bug ID CSCds85763.
The full text of this advisory can be viewed at:
http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml.
Affected Products
Catalyst 6000, 5000, 4000 images with SSH support. Version 6.1(1),
6.1(1a), 6.1(1b) with 3 DES features only.
Only the following images are affected:
cat4000-k9.6-1-1.bin
cat5000-sup3cvk9.6-1-1a.bin
cat5000-sup3k9.6-1-1.bin
cat5000-supgk9.6-1-1.bin
cat6000-sup2cvk9.6-1-1b.bin
cat6000-sup2k9.6-1-1b.bin
cat6000-supcvk9.6-1-1b.bin
cat6000-supk9.6-1-1b.bin
Cisco IOS 12.1 SSH implementation is not affected by this vulnerability.
No other Cisco devices are affected.
Details
Non SSH protocol connection attempts to the SSH service cause a "protocol
mismatch" error, which causes a switch to reload. SSH is not enabled by
default, and must be configured by the administrator.
To verify if your image is affected, run the command "show version". If
the image filename is listed above, and you have enabled SSH, you are
affected by this vulnerability and should upgrade to a fixed version
immediately.
Impact
This vulnerability enables a Denial of Service attack on the Catalyst
switch.
Software Versions and Fixes
This defect is resolved in Cisco Catalyst version 6.1(1c). Previous
affected versions will be deferred, and will no longer be available for
customer download.
Getting Fixed Software
Cisco is offering free software upgrades to remedy this vulnerability for
all affected customers.
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained via the Software Center on Cisco's Worldwide Web site at
http://www.cisco.com.
Customers without contracts should get their upgrades by contacting the
Cisco Technical Assistance Center (TAC). TAC contacts are as follows:
* +1 800 553 2447 (toll-free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Give the URL of this notice as evidence of your entitlement to a free
upgrade. Free upgrades for non-contract customers must be requested through
the TAC. Please do not contact either "psirt@cisco.com" or
"security-alert@cisco.com" for software upgrades.
Workarounds
The workaround for this vulnerability is to disable SSH service. For most
customers using this image, SSH support is necessary, so the recommended
action is to upgrade to a fixed version.
Exploitation and Public Announcements
This vulnerability was reported to Cisco by a customer who discovered the
issue during routine networking tests. There has been no public
disclosure, and no reports of malicious activity with regard to this
vulnerability.
Status of This Notice: FINAL
This is a final notice. Although Cisco cannot guarantee the accuracy of all
statements in this notice, all of the facts have been checked to the best
of our ability. Cisco does not anticipate issuing updated versions of
this notice unless there is some material change in the facts. Should there
be a significant change in the facts, Cisco may update this notice.
Distribution
This notice will be posted on Cisco's Worldwide Web site at
http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml.
In addition to Worldwide Web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail recipients:
* cust-security-announce@cisco.com
* Various internal Cisco mailing lists
* Specifically affected customers
Future updates of this notice, if any, will be placed on Cisco's Worldwide
Web server, but may or may not be actively announced on mailing lists or
newsgroups. Users concerned about this problem are encouraged to check the
URL given above for any updates.
Revision History
Revision 1.0 For public release 13-DEC-2000 10:00 AM US/Pacific
(UTC+0700)
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and registering to
receive security information from Cisco, is available on Cisco's Worldwide
Web site at
http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This
includes instructions for press inquiries regarding Cisco security notices.
------------------------------------------------------------------------
This notice is copyright 2000 by Cisco Systems, Inc. This notice may be
redistributed freely after the release date given at the top of the text,
provided that redistributed copies are complete and unmodified, including
all date and version information.
------------------------------------------------------------------------
- -----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2
iQEVAwUBOjfV+WiN3BRdFxkbAQG0RQf/bLIcBurkEp0RyTYwMp8xQLK4mvESbKsE
nV/g2+hg3r6S+wON2R4wfDaPmIQkY2b9E815RxAq8K0GKy+tQRchanrsvGXyOm+j
u/0BZe1xB+pPcKmVQdQPby2kiYMVT69H9sa/E9hbG/E3w5Ad6VS46rTtdcMT9IBf
WXLFfwRRNmRkn2WVSwh3AJKJBSVaTDjrxGRegrETjemGje5YdK1hY+Y3fnmeL5hv
w/MhLLsnI4A9Q4dEvi5H1E/yOX0YmPi5bUKd4i1CEKhLp+1F0+aM4FTozum+YFjY
lN/0xJhk9veWJhb/vN5S6Y4bg1V+mrdT6VuvRBtIphQ0O+aqX4GjsA==
=AH+K
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBOlSNcCh9+71yA2DNAQHTBwP9H+zD9HSnrhzlWWgMjjshfsfVNudk7WKw
dpcRZlQZ4BffyI3E8bGWyw+AQYZ+S0W2GTetGCGdxnCJdB4mZNh6jNbu8wYZ6MK+
Vhm85aiqzVasxeKjpUyzVjmIAaDCyfXIwW5JNYjhl4xDodMucg/FylsgLABVt0+2
32KmKYjEYsk=
=Zuyw
-----END PGP SIGNATURE-----
|