安全研究

安全漏洞
Cisco IOS SSL VPN内存泄露拒绝服务漏洞

发布日期:2010-09-23
更新日期:2010-09-26

受影响系统:
Cisco IOS 15.1
Cisco IOS 15.0
Cisco IOS 12.4
Cisco IOS 12.3
描述:
CVE ID: CVE-2010-2836

Cisco IOS是Cisco网络设备上所使用的互联网操作系统。

配置了带有HTTP端口重新定向的SSL VPN功能的Cisco IOS设备在处理异常终端的SSL会话时可能会泄露TCB,持续攻击可能导致设备耗尽内存资源,造成设备重载无法为新的TCP连接提供服务,以及其他拒绝服务情况。无需认证便可利用这个漏洞。
  
必须完成完整的TCP三重握手才可以利用这个漏洞。

<*来源:Cisco
  
  链接:http://secunia.com/advisories/41552/
        http://www.cisco.com/warp/public/707/cisco-sa-20100922-sslvpn.shtml
*>

建议:
临时解决方法:

* 可在webvpn网关配置模式执行no http-redirect port命令来禁用SSL VPN连接的HTTP重新定向。
  
此外,通过clear tcp tcb *命令手动清除挂起的TCB可将TCB转换到CLOSED状态。在一段时间后,可清除CLOSED状态并释放内存。


* 可在以下链接的Cisco Beyond: Embedded Event Manager (EEM) Scripting Community下载Tcl脚本:
   http://forums.cisco.com/eforum/servlet/EEM?page=eem&fn=script&scriptId=2041
  
以下是示例设备配置。

        !
        !-- Location where the Tcl script will be stored
        !

        event manager directory user policy disk0:/eem

        !
        !-- Define variable and set the monitoring interval
        !-- as an integer (expressed in seconds)
        !

        event manager environment EEM_MONITOR_INTERVAL 60

        !
        !-- Define variable and set the threshold value as
        !-- an integer for the number of retransmissions
        !-- that determine if the TCP connection is hung
        !-- (a recommended value to use is 15)
        !

        event manager environment EEM_MONITOR_THRESHOLD 15

        !
        !-- Define variable and set the value to "yes" to
        !-- enable the clearing of hung TCP connections
        !

        event manager environment EEM_MONITOR_CLEAR yes

        !
        !-- Define variable and set to the TCP connection
        !-- state or states that script will monitor, which
        !-- can be a single state or a space-separated list
        !-- of states
        !

        event manager environment EEM_MONITOR_STATES CLOSEWAIT

        !
        !-- Register the script as a Cisco EEM policy
        !

        event manager policy monitor-sockets.tcl

        !

厂商补丁:

Cisco
-----
Cisco已经为此发布了一个安全公告(cisco-sa-20100922-sslvpn)以及相应补丁:
cisco-sa-20100922-sslvpn:Cisco IOS SSL VPN Vulnerability
链接:http://www.cisco.com/warp/public/707/cisco-sa-20100922-sslvpn.shtml

浏览次数:3460
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障