[scg-sec] Telnet Vulnerability

Wendy Garvin wgarvin at cisco.com
Thu Aug 26 16:14:46 EDT 2004


Folks,

The detail about the window size will be withheld from the initial advisory
in order to give customers time to implement the vty acl. Since we can't
write ACL's to block a connection based on the window size, there doesn't
seem to be any value in releasing this detail at first. At some point, we'll
want IDS vendors to be able to detect this and we'll release the details
then. The idea is to buy time. We may release this detail to the nsp-sec
list before we put it in the advisory.

Thanks, and let me know if you think you see attempted exploitation. I wish
we could detect this with netflow. If any of you employ IDS systems and can
write custom signatures, we'd sure like to know if you get attacked.

Paul - Can Junipers do ACLs based on window size?

By the way, we're considering this an annoyance attack rather than a
production affecting attack, as it doesn't affect other TCP based protocols
like BGP or LDP. The worst we can see happening is that people are locked
out of managing their routers until they can get someone on site. While this
is not a good situation, at least the device is still routing and switching
traffic. We're also interested in knowing if that risk assessment misses
anything from your deployment point of view.

Thanks,

-Wendy

> Battles, Timothy A (Tim), ALABS <tmbattles at att.com> [2004-08-26 11:51] wrote:
> 
> Ohh, and clear line vty x
> 
> Will not work.
> 
> must be a clear tcp
> 
> >-----Original Message-----
> >From: Jared Mauch [mailto:jared at puck.nether.net]
> >Sent: Thursday, August 26, 2004 1:43 PM
> >To: Battles, Timothy A (Tim), ALABS
> >Cc: scg-sec at puck.nether.net
> >Subject: Re: [scg-sec] Telnet Vulnerability
> >
> >
> >	so if there is a vty acl, we're safe, or semi-safe (ie: 
> >hosts in the
> >acl only that can do 3-way).
> >
> >	- jared
> >
> >On Thu, Aug 26, 2004 at 02:39:19PM -0400, Battles, Timothy A 
> >(Tim), ALABS wrote:
> >> 
> >> Cisco Day1 VTY Vulnerability
> >> 
> >> We have recently by accident discovered the following.
> >> 
> >> After completing a 3-Way handshake with IOS and sending a 
> >Window size of 0, the VTY handler becomes confused 
> >> and will not allow other session to become established, 
> >SYN-ACKS will be received from the router.
> >>  
> >> In order to clear the session a
> >> 
> >> clear tcp tcb xxxxxxxx
> >> clear tcp line x
> >> clear tcp line vty x
> >> 
> >> 
> >> needs to be issued.
> >> 
> >> 
> >> Some clarifiers
> >> This effects both telnet and ssh.
> >> The packet cannot be spoofed.
> >> This is IOS only. Day 1
> >> 
> >> 
> >> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> >> Timothy A Battles
> >> AT&T IP Network Security Group
> >> Work: (314)770-3326
> >> Cell: (314)280-4578
> >> Fax:  (314)770-9568
> >> Email: tmbattles at att.com
> >> 12976 Hollenberg Drive
> >> Bridgeton, MO 63044-2407
> >> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> >> 
> >> 
> >> 
> >> 
> >> 
> >> _______________________________________________
> >> scg-sec mailing list
> >> scg-sec at puck.nether.net
> >> https://puck.nether.net/mailman/listinfo/scg-sec
> >
> >-- 
> >Jared Mauch  | pgp key available via finger from jared at puck.nether.net
> >clue++;      | http://puck.nether.net/~jared/  My statements 
> >are only mine.
> >
> 
> _______________________________________________
> scg-sec mailing list
> scg-sec at puck.nether.net
> https://puck.nether.net/mailman/listinfo/scg-sec
> 
> [    ----- End of Included Message -----    ]

-- 
Wendy Garvin - Cisco PSIRT - 408 525-1888 CCIE# 6526
----------------------------------------------------
           http://www.cisco.com/go/psirt


More information about the scg-sec mailing list