Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.1022 -- [Appliance][Cisco] Cisco VLAN Trunking Protocol Vulnerability 6 November 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Publisher: Cisco Systems Operating System: Cisco Network Appliance Impact: Denial of Service Access: Remote/Unauthenticated Original Bulletin: http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Response: Cisco VLAN Trunking Protocol Vulnerability http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml Revision 1.0 For Public Release 2008 November 5 1600 UTC (GMT) Cisco Response ============== This is the Cisco response to research done by 'showrun.lee' pertaining to a crafted VTP packet denial of service vulnerability. We would like to thank 'showrun.lee' for reporting this vulnerability to us. We greatly appreciate the opportunity to work with researchers on security vulnerabilities, and welcome the opportunity to review and assist in security vulnerability reports against Cisco products. This vulnerability is being addressed by Cisco Bug IDs: * CSCsv05934 - Crafted VTP packet crashes device running IOS * CSCsv11741 - Crafted VTP packet crashes switch running CatOS Additional Information ====================== The VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. When a network administrator makes any configuration changes to the VLAN setup on one device working as a VTP server, said configuration is then distributed via the VTP protocol through all switches in the domain. This reduces the need for replicating this VLAN configuration manually across switches. VTP is a Cisco-proprietary protocol that is available on most of the Cisco Catalyst series products using both Cisco IOS and Cisco CatOS system software. Cisco's VTP protocol implementation in some versions of Cisco IOS and CatOS may be vulnerable to a DoS attack via a specially crafted VTP packet sent from the local network segment when operating in either server or client VTP mode. When the device receives the specially crafted VTP packet, the switch may crash (and reload/hang). The crafted packet must be received on a switch interface configured to operate as a trunk port. Devices without a VTP domain name configured are still vulnerable. For devices not requiring the use of VTP, administrators should set the VTP mode as "transparent" via the CLI command "vtp mode transparent". Devices configured with a VTP domain password are still vulnerable to exploitation, without the malicious attacker knowing the VTP domain password. Switch configuration best practices limit exposure to exploitation, by disabling the Dynamic Trunking Protocol (DTP) on all switch ports that are not required to operate as trunk ports. See "Best Practices for Catalyst 6500/6000 Series and Catalyst 4500/4000 Series Switches Running Cisco IOS Software" and "Best Practices for Catalyst 4500/4000, 5500/5000, and 6500/6000 Series Switches Running CatOS Configuration and Management" for further information. http://www.cisco.com/en/US/products/hw/switches/ps700/products_white_paper09186a00801b49a4.shtml#cg4 http://www.cisco.com/en/US/products/hw/switches/ps663/products_tech_note09186a0080094713.shtml#dtp Products affected by this vulnerability: * Devices running affected versions of Cisco IOS or CatOS that have VTP Operating Mode as either "server" or "client". * Devices running affected versions of Cisco IOS with Ethernet Switch Modules for Cisco 1800/2600/2800/3600/3700/3800 Series Routers that have VTP Operating Mode as either "server" or "client". Products not affected by these vulnerabilities: * Devices configured with VTP operating mode as "transparent". * Devices configured with VTP version 3 (CatOS only) To determine the current VTP operating mode on a Cisco device, log into the device and issue the show vtp status command on an IOS device or the show vtp domain command on a CatOS device. Switches that show either "server" or "client" as the VTP operating mode are affected by this vulnerability. The following example shows a device running Cisco IOS and operating in VTP "server" mode: ios_switch#show vtp status VTP Version : 2 Configuration Revision : 0 Maximum VLANs supported locally : 1005 Number of existing VLANs : 5 VTP Operating Mode : Server VTP Domain Name : test VTP Pruning Mode : Disabled VTP V2 Mode : Enabled VTP Traps Generation : Disabled MD5 digest : <removed> Configuration last modified by 0.0.0.0 at 3-1-93 04:02:09 ios_switch# The following example shows a device running Cisco CatOS and operating in VTP "server" mode: catos_switch> (enable) show vtp domain Version : running VTP1 (VTP3 capable) Domain Name : test Password : not configured Notifications: disabled Updater ID: 0.0.0.0 Feature Mode Revision -------------- -------------- ----------- VLAN Server 2 Pruning : disabled VLANs prune eligible: 2-1000 catos_switch> (enable) Status of this Notice: FINAL ============================ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Revision History ================ +---------------------------------------+ | Revision | | Initial | | 1.0 | 2008-November-5 | public | | | | release | +---------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at: http://www.cisco.com/go/psirt - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (SunOS) iD8DBQFJEcP686n/Gc8U/uARAuNkAJ4/chmZxABwfS3TMvYlMVQvnlyt/QCeLRpy VVaw0JqW9wqvVCdARmMjYYI= =H1JU - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBSRI53Ch9+71yA2DNAQKuTAP8DxVzjAI/oim9AkCjObVatr3GVCqMjKYn H5hqsK2Xaw6u6pWbUzEP701Df1N3iBxvKM6kflX2yaqJ4dOBOHSYUvXuffkwvlce 0DIFiq9J/iziUq/cjbQRfGEfXkpNMPZrR9Ze/Ro5+mg6clzpjVYPTgbUhDr5d/Ry EDx41qlorXI= =ikgB -----END PGP SIGNATURE-----