安全研究

安全漏洞
Cisco IOS IPv6路由头信息泄露及拒绝服务漏洞

发布日期:2007-08-08
更新日期:2007-08-10

受影响系统:
Cisco IOS XR 3.x
Cisco IOS 12.3  
Cisco IOS 12.2
Cisco IOS 12.1
Cisco IOS 12.0
描述:
CVE ID: CVE-2007-4285

Cisco IOS是Cisco网络设备中所使用的操作系统。

Cisco IOS和Cisco IOS XR在处理包含Type 0路由头的特制IPv6报文时存在漏洞,可能导致在受影响的IOS和IOS XR设备上出现信息泄露或受影响的IOS设备崩溃。

成功利用本文所述漏洞会导致在IPv6报文头中目标IPv6地址与距离报文缓冲区内存16字节处相互交换内存,这样就以IPv6目标地址的形式从缓冲区内存泄露数据,通过这个漏洞所访问的内存不会高于报文头起始处1500个字节。对于运行Cisco IOS的设备,最严重的情况是IOS设备完全崩溃;对于运行Cisco IOS XR的设备,成功攻击不会导致整个设备崩溃,而是导致IPv6子系统重启。反复的成功攻击会导致所有使用IPv6做为传输协议的所有上层服务持续的拒绝服务,但不是整个设备拒绝服务。

<*来源:Tom Cross
  
  链接:http://secunia.com/advisories/26359/
        http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-IPv6-leak.shtml
*>

建议:
临时解决方法:

*  应用以下控制面整型(CoPP):

    !-- Permit all IPv6 Routing Header Type 0 (Source Route) packets
    !-- sent to any IPv6 address configured on interfaces of the
    !-- affected device or IPv6 link-local addresses. This traffic
    !-- will be policed and dropped by the CoPP feature.
    !

    ipv6 access-list DENY-IPv6-RH0
     permit ipv6 any any routing-type 0

    !
    !-- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
    !-- traffic in accordance with existing security policies and
    !-- configurations for traffic that is authorized to be sent
    !-- to infrastructure devices.
    !
    !-- Create a Class-Map for traffic to be policed by the CoPP feature.
    !

    class-map match-all drop-IPv6-RH0-class
      match access-group name DENY-IPv6-RH0

    !
    !-- Create a Policy-Map that will be applied to the Control-Plane of
    !-- the device.

    policy-map drop-IPv6-RH0-traffic
      class drop-IPv6-RH0-class
            drop

    !
    !-- Apply the Policy-Map to the Control-Plane of the device.

    control-plane
      service-policy input drop-IPv6-RH0-traffic

    !

* 没有部署移动IPv6的Cisco IOS设备

对于IOS 12.2(15)T之前版本,使用ACL过滤所有包含有路由头的报文:

    Router(config)#ipv6 access-list deny-sourcerouted
    Router(config-ipv6-acl)#deny ipv6 any <myaddress1> routing
    Router(config-ipv6-acl)#deny ipv6 any <myaddress2> routing
    Router(config-ipv6-acl)#permit ipv6 any any

    Router(config-ipv6-acl)#exit
    Router(config)#interface Ethernet0
    Router(config-if)#ipv6 traffic-filter deny-sourcerouted in

* 部署了移动IPv6的Cisco IOS设备

IOS 12.2(15)T之后版本使用ipv6 source-route命令:

   Router(config)#no ipv6 source-route

IOS 12.4(2)T版本中IPv6 ACL中添加了新的关键字routing-type,可用于有选择性的允许或拒绝特定的路由类型:

    Router(config)#ipv6 access-list deny-sourcerouted
    Router(config-ipv6-acl)#deny ipv6 any <myaddress1> routing-type 0
    Router(config-ipv6-acl)#permit ipv6 any any
    Router(config)#interface Ethernet0
    Router(config-if)#ipv6 traffic-filter deny-sourcerouted in

* 没有部署移动IPv6的Cisco IOS XR设备

使用ACL过滤所有包含有路由头的报文:

    Router-IOS_XR#configure terminal
    Router-IOS_XR(config)#ipv6 access-list deny-ipv6-type0-rh
    Router-IOS_XR(config-ipv6-acl)#deny ipv6 any host 2001:0DB8:12::3 routing
    Router-IOS_XR(config-ipv6-acl)#permit ipv6 any any
    Router-IOS_XR(config-ipv6-acl)#exit
    Router-IOS_XR(config)#interface GigabitEthernet 0/0/0/1
    Router-IOS_XR(config-if)#ipv6 access-group deny-ipv6-type0-rh ingress
    Router-IOS_XR(config-if)#end

厂商补丁:

Cisco
-----
Cisco已经为此发布了一个安全公告(cisco-sa-20070808-IOS-IPv6-leak)以及相应补丁:
cisco-sa-20070808-IOS-IPv6-leak:Cisco IOS Information Leakage Using IPv6 Routing Header
链接:http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-IPv6-leak.shtml

浏览次数:2925
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障