[scg-sec] (fwd) Re: Telnet Vulnerability
Wendy Garvin
wgarvin at cisco.com
Fri Aug 27 15:17:13 EDT 2004
Folks,
There's a corner case where a valid telnet connection could cause a problem,
details at the bottom of this message. Clay's included some valuable info on
identifying an attack case and the source.
----- Forwarded message from Clayton Kossmeyer <ckossmey at cisco.com> -----
Date: Fri, 27 Aug 2004 12:39:38 -0400
From: Clayton Kossmeyer <ckossmey at cisco.com>
To: Wendy Garvin <wgarvin at cisco.com>
Cc: Jason Gardiner <gardiner at sprint.net>, ckossmey at cisco.com
Subject: Re: Telnet Vulnerability
Hi Wendy, Jason -
I'd agree with Wendy on this one, from the information in the case, it
looks to me like it's plausible that the telnet session that triggered
the lockout.
One thing that won't be mentioned in the advisory yet is how to
identify if the window size has gone to 0.
If you suspect monkey-business you can (somewhat) quickly check with
'sh tcp | include sndwnd':
ck-gw#sh tcp | inc sndwnd
iss: 1454838581 snduna: 1455145990 sndnxt: 1455145990 sndwnd: 1400
iss: 822512864 snduna: 822513018 sndnxt: 822513020 sndwnd: 34000
iss: 1324988810 snduna: 1324998274 sndnxt: 1324998274 sndwnd: 34000
iss: 651876200 snduna: 651881526 sndnxt: 651881526 sndwnd: 58480
If you see a 'sndwnd' field that's gone to 0 (or something oddly low,
as Wendy mentions below), that could be your culprit. Iterating
through 'sh tcp vty <x> | inc sndwnd' will tell you which connection
is causing the problem. 'clear tcp line vty <x>' will disconnect it.
Clay
On Fri, Aug 27, 2004 at 09:02:49AM -0700, Wendy Garvin wrote:
>
> Thanks Jason,
>
> It looks like the same thing. There's a corner case which we didn't mention
> in the advisory in which you can be telnetted into the router from a small
> segment size (MSS < 1/4 of the destination router MSS) - if the router is
> under a dos attack or is spiking CPU for another reason, and that telnet
> connection is lost, and the window size is permanently stuck at less than
> 1/4 of the destination router MSS, and the router is busy with other things
> and doesn't change state on the connection to note that it's dropped.
>
> That's normally hard to trigger, because a proper telnet session will change
> in window size, and the recipient telnet process will note that change, so
> it won't get stuck. Under most circumstances the router will see that
> the session has dropped and reset the connection. It's only in combination
> with another high cpu or low memory event that we may see this corner case.
>
> So I'd be hesitant to guess that your router came under attack with this
> vulnerability, I think it's more likely it was a rare combination of events.
> I've copied Clay on this as well so he can hop in with an opinion if he'd
> like.
>
> -Wendy
----- End forwarded message -----
--
Wendy Garvin - Cisco PSIRT - 408 525-1888 CCIE# 6526
----------------------------------------------------
http://www.cisco.com/go/psirt
More information about the scg-sec
mailing list