安全研究

安全漏洞
Cisco IOS软件L2TP拒绝服务漏洞

发布日期:2008-09-24
更新日期:2008-09-27

受影响系统:
Cisco IOS 12.4
Cisco IOS 12.2
描述:
BUGTRAQ  ID: 31358
CVE(CAN) ID: CVE-2008-3813

Cisco IOS是思科网络设备上所使用的互联网操作系统。

Cisco IOS软件的2层隧道协议(L2TP)的实现中存在漏洞,运行L2TP mgmt守护进程的设备在处理特制的L2TP报文时会重载。

一些功能在Cisco IOS软件中启用了L2TP mgmt守护进程,包括但不限于L2VPN、L2TPv3、SGBP和Cisco VPDN。一旦启用了这个进程设备就会受漏洞影响。

<*来源:Cisco安全公告
  
  链接:http://secunia.com/advisories/31990/
        http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml
*>

建议:
临时解决方法:

* 基础架构ACL(iACL)
    
        !--- Permit L2TP UDP 1701 packets from all trusted
        !--- sources destined to infrastructure addresses.
        !--- NOTE: This does not prevent spoofed attacks.
        !---           To be a full mitigation, no trusted source
        !---           addresses should be listed.
        !---           Omit this line if using a L2TPv3 over IP implementation only.


        access-list 150 permit udp TRUSTED_SOURCE_ADDRESSES MASK
           INFRASTRUCTURE_ADDRESSES MASK eq 1701


        !--- Deny L2TP UDP 1701 packets from all
        !--- sources destined to infrastructure addresses.


        access-list 150 deny udp any INFRASTRUCTURE_ADDRESSES MASK eq 1701


        !--- If using a L2TPv3 over IP implementation ensure to allow L2TPv3


        access-list 150 permit 115 <source_ip_address and mask>
           <destination_ip_address and mask>


        !--- Permit/deny all other Layer 3 and Layer 4 traffic in accordance
        !--- with existing security policies and configurations
        !--- Permit all other traffic to transit the device.


        access-list 150 permit ip any any


        !--- Apply access-list to all interfaces (only one example shown)


        interface serial 2/0
        ip access-group 150 in
  
* 控制面整型(CoPP)

        !--- Deny all trusted source L2TP UDP traffic sent to all IP addresses
        !--- configured on all interfaces of the affected device so that it
        !--- will not be policed by the CoPP feature.

        !--- NOTE: This does not prevent spoofed attacks.
        !---           To be a full mitigation, no trusted source
        !---           addresses should be listed.
        !---           Omit this line if using an L2TPv3 over IP implementation only.


        access-list 111 deny udp TRUSTED_SOURCE_ADDRESSES MASK
           INFRASTRUCTURE_ADDRESSES MASK eq 1701


        !--- Permit all L2TP UDP traffic sent to all IP addresses
        !--- configured on all interfaces of the affected device so that it
        !--- will be policed and dropped by the CoPP feature


        access-list 111 permit udp any INFRASTRUCTURE_ADDRESSES MASK eq 1701


        !--- If using an L2TPv3 over IP implementation ensure not to drop L2TPv3


        access-list 111 deny 115 <source_ip_address and mask>
           <destination_ip_address and mask>


        !--- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
        !--- traffic in accordance with existing security policies and
        !--- configurations for traffic that is authorized to be sent
        !--- to infrastructure devices

        !--- Create a Class-Map for traffic to be policed by
        !--- the CoPP feature



        class-map match-all drop-l2tp-class
        match access-group 111



        !--- Create a Policy-Map that will be applied to the
        !--- Control-Plane of the device.


        policy-map drop-l2tp-traffic
        class drop-l2tp-class
        drop



        !--- Apply the Policy-Map to the
        !--- Control-Plane of the device


        control-plane

        service-policy input drop-l2tp-traffic
  
请注意12.2S和12.0S的Cisco IOS系列中policy-map句法有所不同:

        policy-map drop-l2tp-traffic
        class drop-l2tp-class
        police 32000 1500 1500 conform-action drop exceed-action drop

厂商补丁:

Cisco
-----
Cisco已经为此发布了一个安全公告(cisco-sa-20080924-l2tp)以及相应补丁:
cisco-sa-20080924-l2tp:Cisco IOS Software Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability
链接:http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml

浏览次数:2771
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障