[nsp-sec] FYI - Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerability

Dario Ciccarone (dciccaro) dciccaro at cisco.com
Sun Aug 30 00:33:12 EDT 2020


John, yes, correct - the issue is on the processing of DVMRP traffic over IGMP - even if DVMRP is not in used, if IGMP us being processed, then you'll run into this issue.

You have also raised a good point on the title - while the root cause is on the code processing DVMRP, I wonder now if we shouldn't have called it "Cisco IOS XR Software IGMP Memory Exhaustion Vulnerability". We always struggle on this area - because if we say "IGMP memory exhaustion" or even more generically, "packet processing exhaustion", then A LOT more people will have a bit of a heart attack - until they read the whole advisory, and then they'll go "Geez, Cisco, you almost killed me - it is only for those w/ multicast routing enabled !"

Always a fine line. Do you have any ideas you would like to share on the above ? What would you prefer - (a) a "more generic title which makes me read the SA, but may also worry me needlessly" or (b) a "more specific title, but which may make me skip reading the SA - and I might be affected" ?

As said, we struggle - and we can't write the whole SA on the title, so some balance is neeed.


On 8/29/20, 3:32 PM, "nsp-security on behalf of John Kristoff" <nsp-security-bounces at puck.nether.net on behalf of jtk at depaul.edu> wrote:

    ----------- nsp-security Confidential --------

    On Sat, 29 Aug 2020 03:36:32 +0000
    "Dario Ciccarone (dciccaro)" <dciccaro at cisco.com> wrote:

    > New advisory just published minutes ago -
    > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz

    Hi Dario,

    I think some people will see DVMRP and skim past this.  To clarify,
    this problem does not require one run DVMRP per se, this is really an
    issuing stemming from the underlying IGMP protocol within which DVMRP
    is encapsulated.  Probably most routers will support some level of IGMP
    functionality, so nets with vulnerable gear shouldn't skim past this so
    quickly.  Fair assessment?

    John


    _______________________________________________
    nsp-security mailing list
    nsp-security at puck.nether.net
    https://puck.nether.net/mailman/listinfo/nsp-security

    Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
    community. Confidentiality is essential for effective Internet security counter-measures.
    _______________________________________________



More information about the nsp-security mailing list