ESB-2018.2629.2 - UPDATE [Cisco] Cisco Products: Denial of service - Remote/unauthenticated 2018-09-14

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.2629.2
        Linux and FreeBSD Kernels TCP Reassembly Denial of Service
                 Vulnerabilities Affecting Cisco Products
                             14 September 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Products
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6922 CVE-2018-5390 

Reference:         ESB-2018.2623
                   ESB-2018.2612
                   ESB-2018.2277
                   ESB-2018.2271

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp

Revision History:  September 14 2018: Vendor updated lists of products under 
                                        investigation, vulnerable and not vulnerable,
                                        and fixed release availability
                   September  5 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Security Advisory

Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities
Affecting Cisco Products: August 2018

Severity: High
Advisory ID: cisco-sa-20180824-linux-tcp
First Published: 2018 August 24 21:30 GMT
Last Updated: 2018 September 13 18:32 GMT
Version 1.5: Interim
Workarounds: No workarounds available

CVE-2018-5390
CVE-2018-6922
CWE-400
CVE-2018-5390
CVE-2018-6922
CWE-400


Summary

  * On August 6, 2018, the Vulnerability Coordination team of the National
    Cyber Security Centre of Finland (NCSC-FI) and the CERT Coordination Center
    (CERT/CC) disclosed vulnerabilities in the TCP stacks that are used by the
    Linux and FreeBSD kernels. These vulnerabilities are publicly known as
    SegmentSmack.

    The vulnerabilities could allow an unauthenticated, remote attacker to
    cause a denial of service (DoS) condition on an affected device. An attack
    could be executed by using low transfer rates of TCP packets, unlike
    typical distributed denial of service (DDoS) attacks.

    The vulnerabilities are due to inefficient TCP reassembly algorithms in the
    TCP stacks that are used by the affected kernels. Linux Kernel Versions 4.9
    and later and all supported versions of the FreeBSD kernel are known to be
    affected by these vulnerabilities.

    An attacker could exploit these vulnerabilities by sending a stream of
    packets that are designed to trigger the issue in an established TCP
    session with an affected device. A sustained DoS condition requires the
    attacker to maintain a continuous stream of malicious traffic. Due to the
    required use of an established session, an attack cannot be performed using
    spoofed IP addresses.

    This advisory will be updated as additional information becomes available.

    Cisco will release software updates that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180824-linux-tcp

Affected Products

  * Cisco is investigating its product line to determine which products and
    services may be affected by these vulnerabilities. The investigation is
    focusing primarily on Cisco products that use Linux Kernel Version 4.9 or
    later or any supported version of the FreeBSD kernel. However, reports have
    indicated that some earlier versions of the Linux Kernel may be affected in
    similar ways if they are exposed to the same attack at significantly higher
    traffic rates. Therefore, Cisco is also evaluating the impact on these
    systems.

    The "Vulnerable Products" section of this advisory includes Cisco bug IDs
    for each affected product or service. The bugs are accessible through the
    Cisco Bug Search Tool and contain additional platform-specific information,
    including workarounds (if available) and fixed software releases.

    Any product or service not listed in the "Products Under Investigation" or
    "Vulnerable Products" section of this advisory is to be considered not
    vulnerable. Because this is an ongoing investigation, be aware that
    products and services that are currently considered not vulnerable may
    subsequently be considered vulnerable as additional information becomes
    available.

    Products Under Investigation

    The following products are under active investigation to determine whether
    they are affected by the vulnerability that is described in this advisory.

    Voice and Unified Communications Devices
      + Cisco Webex Video Mesh Node
      + Cisco Webex Hybrid Data Security Node

   
    Vulnerable Products

    The following table lists Cisco products that are affected by the Linux
    Kernel vulnerability that is described in this advisory:

    Product                   Cisco Bug ID     Fixed Release Availability

    * Network and Content Security Devices
    
    Cisco Threat Grid Appliance M5             CSCvk69486 2.5 (Oct-2018)
    
    *Routing and Switching - Enterprise and Service Provider

    Cisco DNA Center                           CSCvm34581
    Cisco Network Assurance Engine             CSCvm34702

    *Video, Streaming, TelePresence, and Transcoding Devices

    Cisco Expressway Series                    CSCvk74922 x12.0 (Nov-2018)
    Cisco Meeting Management                   CSCvk69487 1.1.0.27 (Sept-2018)
    Cisco TelePresence Conductor               CSCvk75754 4.3.4 MR (Nov-2018)
    Cisco TelePresence Video Communication     CSCvk74922 x12.0 (Nov-2018)
    Server (VCS)

    The following table lists Cisco products that are affected by the FreeBSD
    vulnerability that is described in this advisory:

    Product                    Cisco Bug ID     Fixed Release Availability

    *Network and Content Security Devices

    Cisco Content Security Management Appliance  CSCvk74266 12.0.0 (Nov-2018)
    (SMA)
    Cisco Email Security Appliance (ESA)         CSCvk74109 11.0.3 (Oct-2018)
                                                            12.0.0 (Nov-2018)
                                                            10.1.4 (Sept-2018)
    Cisco Web Security Appliance (WSA)           CSCvk74112 10.5.3 (Oct-2018)
                                                            11.5.2 (Nov-2018)
    
    *Video, Streaming, TelePresence, and Transcoding Devices

    Cisco TelePresence MCU 5300 Series, MSE 8420 CSCvk74254
    Cisco TelePresence MCU MSE 8510              CSCvk74254
    Cisco TelePresence Server 7010 and MSE 8710  CSCvk74256
    Cisco TelePresence Server on Multiparty      CSCvk74256
    Media 310, 320 and 820


    Products Confirmed Not Vulnerable

    Only products and services listed in the ?Vulnerable Products? section of
    this advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    products and services:

    Network and Content Security Devices
      + Cisco Firepower Management Center

    Video, Streaming, TelePresence, and Transcoding Devices
      + Cisco TelePresence MCU 4200 Series and 4500 Series
      + Cisco TelePresence Advanced Media Gateway Series

Workarounds

  * Any workarounds will be documented in the product-specific Cisco bugs,
    which are identified in the ?Vulnerable Products? section of this advisory.

    It is important to note that exploitation of these vulnerabilities requires
    an attacker to establish a TCP three-way handshake with an open TCP port on
    an affected device. Customers are therefore advised to use an external
    firewall to allow only explicitly trusted source IP addresses to connect to
    open TCP ports on affected devices.

Fixed Software

  * For information about fixed software releases, consult the Cisco bugs
    identified in the "Vulnerable Products" section of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    TAC or their contracted maintenance providers.

Exploitation and Public Announcements

  * The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any malicious use of the vulnerabilities that are described in this
    advisory.

Source

  * These vulnerabilities were reported by Juha-Matti Tilli, of the Aalto
    University Department of Communications and Networking, and Nokia Bell
    Labs.

Cisco Security Vulnerability Policy

  * To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.


Related to This Advisory

  * Linux Kernel TCP Reassembly Algorithm Remote Denial of Service
    Vulnerability
    FreeBSD TCP Reassembly Denial of Service Vulnerability

URL

  * https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180824-linux-tcp

Revision History

  * 
    +-----------------------------------------------------------------------------+
    | Version |      Description       |  Section   | Status  |       Date        |
    |---------+------------------------+------------+---------+-------------------|
    |         | Updated the lists of   |            |         |                   |
    |         | products under         |            |         |                   |
    |         | investigation. Moved   | Affected   |         |                   |
    |         | Firepower Management   | Products,  |         |                   |
    |         | Center to the products | Vulnerable |         |                   |
    | 1.5     | confirmed not          | Products,  | Interim | 2018-September-13 |
    |         | vulnerable as after    | Products   |         |                   |
    |         | further evaluation, no | Confirmed  |         |                   |
    |         | publicly available     | Not        |         |                   |
    |         | software releases were | Vulnerable |         |                   |
    |         | found to be            |            |         |                   |
    |         | vulnerable.            |            |         |                   |
    |---------+------------------------+------------+---------+-------------------|
    |         | Updated the lists of   |            |         |                   |
    |         | products under         | Affected   |         |                   |
    |         | investigation and      | Products,  |         |                   |
    | 1.4     | vulnerable products.   | Vulnerable | Interim | 2018-September-06 |
    |         | Updated information    | Products   |         |                   |
    |         | about fixed release    |            |         |                   |
    |         | availability.          |            |         |                   |
    |---------+------------------------+------------+---------+-------------------|
    |         | Updated the lists of   | Affected   |         |                   |
    |         | products under         | Products,  |         |                   |
    |         | investigation,         | Vulnerable |         |                   |
    |         | vulnerable products,   | Products,  |         |                   |
    | 1.3     | and products confirmed | Products   | Interim | 2018-September-04 |
    |         | not vulnerable.        | Confirmed  |         |                   |
    |         | Updated information    | Not        |         |                   |
    |         | about fixed release    | Vulnerable |         |                   |
    |         | availability.          |            |         |                   |
    |---------+------------------------+------------+---------+-------------------|
    |         | Updated information    | Vulnerable |         |                   |
    | 1.2     | about fixed release    | Products   | Interim | 2018-August-30    |
    |         | availability.          |            |         |                   |
    |---------+------------------------+------------+---------+-------------------|
    |         | Updated the lists of   | Affected   |         |                   |
    |         | products under         | Products,  |         |                   |
    |         | investigation and      | Vulnerable |         |                   |
    | 1.1     | products confirmed not | Products,  | Interim | 2018-August-29    |
    |         | vulnerable. Updated    | Products   |         |                   |
    |         | information about      | Confirmed  |         |                   |
    |         | fixed release          | Not        |         |                   |
    |         | availability.          | Vulnerable |         |                   |
    |---------+------------------------+------------+---------+-------------------|
    | 1.0     | Initial public         | ?          | Interim | 2018-August-24    |
    |         | release.               |            |         |                   |
    +-----------------------------------------------------------------------------+

- ---

Legal Disclaimer

  * THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO
    UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  * To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.


Related to This Advisory

  * Linux Kernel TCP Reassembly Algorithm Remote Denial of Service
    Vulnerability
    FreeBSD TCP Reassembly Denial of Service Vulnerability


- --------------------------------------------------------------------------------


Cisco Security Advisory

Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities
Affecting Cisco Products: August 2018

High
Advisory ID:      cisco-sa-20180824-linux-tcp
First Published:  2018 August 24 21:30 GMT
Last Updated:     2018 September 4 18:05 GMT
Version 1.3:      Interim
Workarounds:      No workarounds available

CVE-2018-5390
CVE-2018-6922
CWE-400

Summary

  * On August 6, 2018, the Vulnerability Coordination team of the National
    Cyber Security Centre of Finland (NCSC-FI) and the CERT Coordination Center
    (CERT/CC) disclosed vulnerabilities in the TCP stacks that are used by the
    Linux and FreeBSD kernels. These vulnerabilities are publicly known as
    SegmentSmack.

    The vulnerabilities could allow an unauthenticated, remote attacker to
    cause a denial of service (DoS) condition on an affected device. An attack
    could be executed by using low transfer rates of TCP packets, unlike
    typical distributed denial of service (DDoS) attacks.

    The vulnerabilities are due to inefficient TCP reassembly algorithms in the
    TCP stacks that are used by the affected kernels. Linux Kernel Versions 4.9
    and later and all supported versions of the FreeBSD kernel are known to be
    affected by these vulnerabilities.

    An attacker could exploit these vulnerabilities by sending a stream of
    packets that are designed to trigger the issue in an established TCP
    session with an affected device. A sustained DoS condition requires the
    attacker to maintain a continuous stream of malicious traffic. Due to the
    required use of an established session, an attack cannot be performed using
    spoofed IP addresses.

    This advisory will be updated as additional information becomes available.

    Cisco will release software updates that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180824-linux-tcp

Affected Products

  * Cisco is investigating its product line to determine which products and
    services may be affected by these vulnerabilities. The investigation is
    focusing primarily on Cisco products that use Linux Kernel Version 4.9 or
    later or any supported version of the FreeBSD kernel. However, reports have
    indicated that some earlier versions of the Linux Kernel may be affected in
    similar ways if they are exposed to the same attack at significantly higher
    traffic rates. Therefore, Cisco is also evaluating the impact on these
    systems.

    The Vulnerable Products section of this advisory includes Cisco bug IDs
    for each affected product or service. The bugs are accessible through the
    Cisco Bug Search Tool and contain additional platform-specific information,
    including workarounds (if available) and fixed software releases.

    Any product or service not listed in the ?Products Under Investigation? or
    ?Vulnerable Products? section of this advisory is to be considered not
    vulnerable. Because this is an ongoing investigation, be aware that
    products and services that are currently considered not vulnerable may
    subsequently be considered vulnerable as additional information becomes
    available.

    Products Under Investigation

    The following products are under active investigation to determine whether
    they are affected by the vulnerabilities that are described in this
    advisory.

    Network and Content Security Devices
      + Cisco Firepower Management Center
      + Cisco Threat Grid Appliance M5

    Routing and Switching - Enterprise and Service Provider
      + Cisco DNA Center
      + Cisco Network Assurance Engine

   
    Vulnerable Products

    The following table lists Cisco products that are affected by the Linux
    Kernel vulnerability that is described in this advisory:

                     Product                   Cisco Bug      Fixed Release
                                                   ID         Availability
              Video, Streaming, TelePresence, and Transcoding Devices
    Cisco Expressway Series                    CSCvk74922 x12.0 (Nov-2018)
    Cisco Meeting Management                   CSCvk69487 1.1.0.27 (Sept-2018)
    Cisco TelePresence Conductor               CSCvk75754 4.3.4 MR (Nov-2018)
    Cisco TelePresence Video Communication     CSCvk74922 x12.0 (Nov-2018)
    Server (VCS)

The following table lists Cisco products that are affected by the FreeBSD
    vulnerability that is described in this advisory:

                      Product                    Cisco Bug     Fixed Release
                                                     ID        Availability
                       Network and Content Security Devices
    Cisco Content Security Management Appliance  CSCvk74266 12.0.0 (Nov-2018)
    (SMA)
    Cisco Email Security Appliance (ESA)         CSCvk74109 11.0.3 (Oct-2018)
                                                            12.0.0 (Nov-2018)
                                                            10.1.4 (Sept-2018)
    Cisco Web Security Appliance (WSA)           CSCvk74112 10.5.3 (Oct-2018)
                                                            11.5.2 (Nov-2018)
              Video, Streaming, TelePresence, and Transcoding Devices
    Cisco TelePresence MCU 5300 Series, MSE 8420 CSCvk74254
    Cisco TelePresence MCU MSE 8510              CSCvk74254
    Cisco TelePresence Server 7010 and MSE 8710  CSCvk74256
    Cisco TelePresence Server on Multiparty      CSCvk74256
    Media 310, 320 and 820


    Products Confirmed Not Vulnerable

    Only products and services listed in the ?Vulnerable Products? section of
    this advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    products and services:

    Video, Streaming, TelePresence, and Transcoding Devices

      + Cisco TelePresence MCU 4200 Series and 4500 Series
      + Cisco TelePresence Advanced Media Gateway Series

Workarounds

  * Any workarounds will be documented in the product-specific Cisco bugs,
    which are identified in the ?Vulnerable Products? section of this advisory.

    It is important to note that exploitation of these vulnerabilities requires
    an attacker to establish a TCP three-way handshake with an open TCP port on
    an affected device. Customers are therefore advised to use an external
    firewall to allow only explicitly trusted source IP addresses to connect to
    open TCP ports on affected devices.

Fixed Software

  * For information about fixed software releases, consult the Cisco bugs
    identified in the ?Vulnerable Products? section of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    TAC or their contracted maintenance providers.

Exploitation and Public Announcements

  * The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any malicious use of the vulnerabilities that are described in this
    advisory.

Source

  * These vulnerabilities were reported by Juha-Matti Tilli, of the Aalto
    University Department of Communications and Networking, and Nokia Bell
    Labs.

Cisco Security Vulnerability Policy

  * To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  * Linux Kernel TCP Reassembly Algorithm Remote Denial of Service
    Vulnerability
    FreeBSD TCP Reassembly Denial of Service Vulnerability

URL

  * https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180824-linux-tcp

Revision History

  * 
    +-----------------------------------------------------------------------------+
    | Version |      Description      |   Section   | Status  |       Date        |
    |---------+-----------------------+-------------+---------+-------------------|
    |         | Updated the lists of  |             |         |                   |
    |         | products under        | Affected    |         |                   |
    |         | investigation,        | Products,   |         |                   |
    |         | vulnerable products,  | Vulnerable  |         |                   |
    | 1.3     | and products          | Products,   | Interim | 2018-September-04 |
    |         | confirmed not         | Products    |         |                   |
    |         | vulnerable. Updated   | Confirmed   |         |                   |
    |         | information about     | Not         |         |                   |
    |         | fixed release         | Vulnerable  |         |                   |
    |         | availability.         |             |         |                   |
    |---------+-----------------------+-------------+---------+-------------------|
    |         | Updated information   | Vulnerable  |         |                   |
    | 1.2     | about fixed release   | Products    | Interim | 2018-August-30    |
    |         | availability.         |             |         |                   |
    |---------+-----------------------+-------------+---------+-------------------|
    |         | Updated the lists of  | Affected    |         |                   |
    |         | products under        | Products,   |         |                   |
    |         | investigation and     | Vulnerable  |         |                   |
    | 1.1     | products confirmed    | Products,   | Interim | 2018-August-29    |
    |         | not vulnerable.       | Products    |         |                   |
    |         | Updated information   | Confirmed   |         |                   |
    |         | about fixed release   | Not         |         |                   |
    |         | availability.         | Vulnerable  |         |                   |
    |---------+-----------------------+-------------+---------+-------------------|
    | 1.0     | Initial public        | ?           | Interim | 2018-August-24    |
    |         | release.              |             |         |                   |
    +-----------------------------------------------------------------------------+

Legal Disclaimer

  * THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO
    UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Q9r8
-----END PGP SIGNATURE-----

« Back to bulletins