Cisco Patches Security Holes

Monday, October 1, 2012 @ 06:10 PM gHale


Cisco released nine security advisories, including eight for its IOS operating system. Quite a few of the vulnerabilities fixed are denial-of-service (DoS) flaws, but none of them can give an attacker the ability to run code remotely on affected machines.

The one bulletin that doesn’t relate to IOS is for a vulnerability in the Cisco Unified Communications Manager. That flaw is a DoS bug in the SIP (session initiation protocol) implementation in UCM. SIP sees use in a variety of products to help set up voice and video calls on IP networks.

RELATED STORIES
Tools Beat Microsoft Crypto
Cisco Closes Multiple Holes
Networking Fixes from Cisco, Wireshark
USB Malware Heart of Investigation

“A vulnerability exists in the SIP implementation in Cisco Unified Communications Manager that could allow a remote attacker to cause a critical service to fail, which could interrupt voice services. This vulnerability is triggered when an affected device processes a crafted SIP message that contains a valid Session Description Protocol (SDP) message. Only traffic destined to the device can trigger the vulnerability; transit SIP traffic is not an exploit vector,” Cisco officials said.

One of the IOS vulnerabilities also relates to SIP and could result in a DoS for affected machines.

“A vulnerability exists in the SIP implementation in Cisco IOS Software and Cisco IOS XE Software that could allow a remote attacker to cause an affected device to reload. This vulnerability is triggered when an affected device processes a crafted SIP message that contains a valid Session Description Protocol (SDP) message. Only traffic destined to the device can trigger the vulnerability; transit SIP traffic is not an exploit vector. SDP pass-through must be enabled, either at the global level, or at the dial-peer level, for a device to be affected by this vulnerability,” a Cisco advisory said.

There also is a vulnerability in the BGP implementation in IOS that could wind up preventing affected machines from routing BGP packets to neighboring peers.

“Cisco IOS Software contains a vulnerability in the BGP routing protocol feature. This vulnerability affects Cisco IOS Software, Cisco IOS-XR Software, and Cisco IOS-XE Software. Cisco NXOS Software is not affected. The vulnerability may be triggered when the router receives a malformed attribute from a peer on an existing BGP session. At least one BGP neighbor session must be established for a router to be vulnerable. Successful exploitation of this vulnerability may cause all BGP peers to reset. Repeated exploitation may result in an inability to route packets to BGP neighbors during reconvergence times,” Cisco said.

Click here for the full list of Cisco security advisories.



Leave a Reply

You must be logged in to post a comment.