-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0705
              Cisco NX-OS Software: Multiple Vulnerabilities
                             25 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco NX-OS
Publisher:         Cisco Systems
Operating System:  Cisco
                   Virtualisation
Impact/Access:     Root Compromise            -- Remote/Unauthenticated      
                   Modify Arbitrary Files     -- Remote/Unauthenticated      
                   Denial of Service          -- Remote/Unauthenticated      
                   Cross-site Request Forgery -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1387 CVE-2021-1367 CVE-2021-1361
                   CVE-2021-1229 CVE-2021-1227 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2

Comment: This bulletin contains five (5) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco NX-OS Software ICMP Version 6 Memory Leak Denial of Service Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq
First Published: 2021 February 24 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv24541 CSCvv96592 CSCvv96593
CVE Names:       CVE-2021-1229
CWEs:            CWE-401

Summary

  o A vulnerability in ICMP Version 6 (ICMPv6) processing in Cisco NX-OS
    Software could allow an unauthenticated, remote attacker to cause a slow
    system memory leak, which over time could lead to a denial of service (DoS)
    condition.

    This vulnerability is due to improper error handling when an
    IPv6-configured interface receives a specific type of ICMPv6 packet. An
    attacker could exploit this vulnerability by sending a sustained rate of
    crafted ICMPv6 packets to a local IPv6 address on a targeted device. A
    successful exploit could allow the attacker to cause a system memory leak
    in the ICMPv6 process on the device. As a result, the ICMPv6 process could
    run out of system memory and stop processing traffic. The device could then
    drop all ICMPv6 packets, causing traffic instability on the device.
    Restoring device functionality would require a device reboot.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    products if they were running a vulnerable release of Cisco NX-OS Software
    and had at least one interface configured for IPv6 traffic:

       MDS 9000 Series Multilayer Switches ( CSCvv24541 )
       Nexus 1000 Virtual Edge for VMware vSphere ( CSCvv96593 )
       Nexus 1000V Switch for Microsoft Hyper-V ( CSCvv96593 )
       Nexus 1000V Switch for VMware vSphere ( CSCvv96593 )
       Nexus 3000 Series Switches ( CSCvv24541 )
       Nexus 5500 Platform Switches ( CSCvv24541 )
       Nexus 5600 Platform Switches ( CSCvv24541 )
       Nexus 6000 Series Switches ( CSCvv24541 )
       Nexus 7000 Series Switches ( CSCvv24541 )
       Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
        (ACI) mode ( CSCvv96592 )
       Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvv24541 )

    For information about which Cisco software releases were vulnerable at the
    time of publication, see the Fixed Software section of this advisory. See
    the Details section in the bug ID(s) at the top of this advisory for the
    most complete and current information.

    Determine the Status of IPv6 on Cisco NX-OS Software

    To determine whether a device will accept incoming IPv6 packets, use the
    show ipv6 interface brief vrf all command at the device CLI. A device could
    be affected by this vulnerability if the command returns an IPv6 interface
    status from at least one interface, as shown in the following example:

        Switch# show ipv6 interface brief vrf all
        IPv6 Interface Status for VRF "default"(1)
        Interface        IPv6 Address/Link-local Address           Interface Status
                                                                   prot/link/admin
        Eth1/65          2001:db8:1:f101::1                        up/up/up
                         fe80::23a:7dff:fe95:d071

        IPv6 Interface Status for VRF "management"(2)
        Interface        IPv6 Address/Link-local Address           Interface Status
                                                                   prot/link/admin

    Note: By default, no IPv6 addresses are enabled in Cisco NX-OS Software. An
    interface of a Nexus device can be configured with an IPv6 address through
    the ipv6 address [...] or ipv6 link-local [...] CLI configuration commands.
    Also, the ipv6 forward CLI configuration command can be used to allow an
    interface to accept IPv6 packets even if no IPv6 address is configured.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower 1000 Series
       Firepower 2100 Series
       Firepower 4100 Series
       Firepower 9300 Security Appliances
       UCS 6200 Series Fabric Interconnects
       UCS 6300 Series Fabric Interconnects
       UCS 6400 Series Fabric Interconnects

Indicators of Compromise

  o This vulnerability causes a system memory leak in the ICMPv6 process.
    ICMPv6 memory exhaustion can result in device instability. The following
    indicators of compromise that may occur if this vulnerability is being
    actively exploited.

    Contact the Cisco Technical Assistance Center (TAC) if additional help is
    needed to determine whether this vulnerability may have been exploited on
    the device.

    Memory Allocation

    Exploitation of this vulnerability will cause the IPCMPv6 process to
    continue allocating memory until the memory limit is reached. This memory
    is not returned, and a device reboot is required to recover. Use the show
    processes memory sort command at the CLI to monitor the MemUsed field. The
    command output also shows the memory limit.

        nxos# show processes memory sort
        PID    MemAlloc  MemLimit    MemUsed     StackBase/Ptr      Process
        -----  --------  ----------  ----------  -----------------  -----------
        7073  561393664  1067925798  1152303104  ffc80440/ffc7fed0  icmpv6

    If the show processes memory sort command is not available, use the show
    processes memory | include icmpv6 command at the CLI:

        nxos# show processes memory | include icmpv6
        PID    MemAlloc  MemLimit    MemUsed     StackBase/Ptr      Process
        -----  --------  ----------  ----------  -----------------  -----------
        27418  26259456  1366538124  1000681472  ffca1d60/ffca1800  icmpv6

    ICMPv6 Errors

    Monitor for syslog messages about ICMPv6 errors, such as the two that
    follow:

       %ICMPV6-3-ATIMERS_ERROR: malloc failed in heap_create

       %ICMPV6-3-ERROR: -Traceback: librsw.so+0x11250e librs w.so+0x10be66
        libam.so+0xd7f3 libam.so+0xe4cd icmpv6=0x1004f000 0x100ed1b9 0x101
        05623 0x10078fe7 libipv6.so+0x14988 librsw.so+0xc8658
        libpthread.so.0+0x609b lib c.so.6+0xd6a5e

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    TAC or their contracted maintenance providers.

    Cisco NX-OS Software

    To help customers determine their exposure to vulnerabilities in Cisco
    NX-OS Software, Cisco provides the Cisco Software Checker to identify any
    Cisco Security Advisories that impact a specific Cisco NX-OS Software
    release and the earliest release that fixes the vulnerabilities that are
    described in each advisory ("First Fixed"). If applicable, the tool also
    returns the earliest release that fixes all the vulnerabilities described
    in all the advisories identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software, platform, and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories or one or more specific advisories.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by choosing the Cisco NX-OS
    Software and platform and then entering a release-for example, 7.0(3)I7(5) 
    for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software
    in ACI mode.

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker and check the Medium check box in the drop-down list
    under Impact Rating when customizing a search.

    Cisco Nexus 7000 Series Switches SMUs

    For Cisco Nexus 7000 Series Switches, software maintenance upgrades (SMUs)
    are available for Cisco NX-OS Software Release 8.2(6). Customers can
    download the following SMUs from the Software Center on Cisco.com:

       n7000-s2-dk9.8.2.6.CSCvx15395.bin
       n7700-s2-dk9.8.2.6.CSCvx15395.bin

    For details about downloading and installing SMUs in Cisco NX-OS Software
    for Cisco Nexus 7000 Series Switches, see the Performing Software
    Maintenance Upgrades section of the Cisco Nexus 7000 Series NX-OS System
    Management Configuration Guide .

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Additional Resources

    For help determining the best Cisco NX-OS Software release for a Cisco
    Nexus Switch, see the following Recommended Releases documents. If a
    security advisory recommends a later release, Cisco recommends following
    the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS Software, see the Recommended
    Releases documents in the release notes for the device.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-FEB-24  |
    +----------+---------------------------+----------+--------+--------------+


- --------------------------------------------------------------------------------


Cisco NX-OS Software IPv6 Netstack Denial of Service Vulnerability

Priority:        High
Advisory ID:     cisco-sa-nxos-ipv6-netstack-edXPGV7K
First Published: 2021 February 24 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvu11961 CSCvu77380
CVE Names:       CVE-2021-1387
CWEs:            CWE-401

Summary

  o A vulnerability in the network stack of Cisco NX-OS Software could allow an
    unauthenticated, remote attacker to cause a denial of service (DoS)
    condition on an affected device.

    This vulnerability exists because the software improperly releases
    resources when it processes certain IPv6 packets that are destined to an
    affected device. An attacker could exploit this vulnerability by sending
    multiple crafted IPv6 packets to an affected device. A successful exploit
    could cause the network stack to run out of available buffers, impairing
    operations of control plane and management plane protocols and resulting in
    a DoS condition. Manual intervention would be required to restore normal
    operations on the affected device.

    For more information about the impact of this vulnerability, see the
    Details section of this advisory.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K

    This advisory is part of the February 2021 Cisco FXOS and NX-OS Software
    Security Advisory Bundled Publication. For a complete list of the
    advisories and links to them, see Cisco Event Response: February 2021 Cisco
    FXOS and NX-OS Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a vulnerable release of Cisco NX-OS Software and have an IPv6 address or
    ipv6 forward configured on at least one interface:

       Nexus 3000 Series Switches ( CSCvu11961 )
       Nexus 5500 Platform Switches ( CSCvu11961 )
       Nexus 5600 Platform Switches ( CSCvu11961 )
       Nexus 6000 Series Switches ( CSCvu11961 )
       Nexus 7000 Series Switches ( CSCvu11961 )
       Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvu11961 )
       UCS 6400 Series Fabric Interconnects ( CSCvu77380 )

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Determine the Status of IPv6 on Cisco NX-OS Software

    To determine whether a device will accept incoming IPv6 packets, use the
    show ipv6 interface brief vrf all command at the device CLI. A device could
    be affected by this vulnerability if the command returns an IPv6 interface
    status from at least one interface, as shown in the following example:

        Switch# show ipv6 interface brief vrf all
        IPv6 Interface Status for VRF "default"(1)
        Interface        IPv6 Address/Link-local Address           Interface Status
                                                                   prot/link/admin
        Eth1/65          2001:db8:1:f101::1                        up/up/up
                         fe80::23a:7dff:fe95:d071

        IPv6 Interface Status for VRF "management"(2)
        Interface        IPv6 Address/Link-local Address           Interface Status
                                                                   prot/link/admin

    Note: By default, no IPv6 addresses are enabled in Cisco NX-OS Software. An
    interface of a Nexus device can be configured with an IPv6 address through
    the ipv6 address [...] or ipv6 link-local [...] CLI configuration commands.
    Also, the ipv6 forward CLI configuration command can be used to allow an
    interface to accept IPv6 packets even if no IPv6 address is configured.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower 1000 Series
       Firepower 2100 Series
       Firepower 4100 Series
       Firepower 9300 Security Appliances
       MDS 9000 Series Multilayer Switches
       Nexus 1000 Virtual Edge for VMware vSphere
       Nexus 1000V Switch for Microsoft Hyper-V
       Nexus 1000V Switch for VMware vSphere
       Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
        (ACI) mode
       UCS 6200 Series Fabric Interconnects
       UCS 6300 Series Fabric Interconnects

Details

  o This vulnerability is due to buffers not freeing properly in the Cisco
    NX-OS Software network stack known as netstack . If an affected device runs
    out of available buffers, it will stop processing incoming packets for
    multiple management plane protocols and control plane protocols (including
    routing protocols). This may cause those protocols to stop working properly
    on the affected device, resulting in operational failures that could impact
    traffic and cause a DoS condition. The impact could depend on the specific
    platform and the software release on the device. A manual reload of the
    device is required to restore normal operations.

    For this vulnerability to be exploited, the IPv6 traffic must be destined
    to an affected device. Traffic that transits an affected device cannot be
    used to exploit this vulnerability.

Indicators of Compromise

  o Exploitation of this vulnerability could cause the affected device to
    consume all available network stack buffers and generate error messages
    similar to the following:

    2021 Jan 25 16:07:39 nexus %NETSTACK-3-MBUF_FAILED: netstack [27340] m_copyin
    () failed in ipv6_data_main() ...
    2021 Jan 25 16:07:44 nexus %NETSTACK-3-IPV6_API_FAILED: netstack [27340]
    m_copyin() failed in ipv6_process_pm_data_msg()

    These error messages could have multiple causes. Customers who observe
    these messages on a device are advised to contact their support
    organization to determine whether the messages indicate that the device has
    been compromised by exploitation of this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Cisco NX-OS Software

    To help customers determine their exposure to vulnerabilities in Cisco
    NX-OS Software, Cisco provides the Cisco Software Checker to identify any
    Cisco Security Advisories that impact a specific Cisco NX-OS Software
    release and the earliest release that fixes the vulnerabilities that are
    described in each advisory ("First Fixed"). If applicable, the tool also
    returns the earliest release that fixes all the vulnerabilities described
    in all the advisories identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software, platform, and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories or one or more specific advisories.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by choosing the Cisco NX-OS
    Software and platform and then entering a release-for example, 7.0(3)I7(5) 
    for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software
    in ACI mode.

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker and check the Medium check box in the drop-down list
    under Impact Rating when customizing a search.

    Cisco UCS Software

    In the following table(s), the left column lists Cisco software releases.
    The center column indicates whether a release is affected by the
    vulnerability described in this advisory and the first release that
    includes the fix for this vulnerability. The right column indicates whether
    a release is affected by all the vulnerabilities described in this bundle
    and which release includes fixes for those vulnerabilities.

    UCS 6400 Series Fabric Interconnects

    Cisco UCS     First Fixed Release  First Fixed Release for All
    Software      for This             Vulnerabilities Described in the Bundle
    Release       Vulnerability        of Advisories
    4.0           4.0(4k)              4.0(4k)
    4.1           4.1(1e)              4.1(1e)

    Additional Resources

    For help determining the best Cisco NX-OS Software release for a Cisco
    Nexus Switch, see the following Recommended Releases documents. If a
    security advisory recommends a later release, Cisco recommends following
    the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS Software, see the Recommended
    Releases documents in the release notes for the device.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security
    Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-FEB-24  |
    +----------+---------------------------+----------+--------+--------------+


- --------------------------------------------------------------------------------


Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability

Priority:        High
Advisory ID:     cisco-sa-nxos-nxapi-csrf-wRMzWL9z
First Published: 2021 February 24 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvr82908 CSCvu67365 CSCvv92342
CVE Names:       CVE-2021-1227
CWEs:            CWE-352

CVSS Score:
8.1  AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the NX-API feature of Cisco NX-OS Software could allow
    an unauthenticated, remote attacker to conduct a cross-site request forgery
    (CSRF) attack on an affected system.

    This vulnerability is due to insufficient CSRF protections for the NX-API
    on an affected device. An attacker could exploit this vulnerability by
    persuading a user of the NX-API to follow a malicious link. A successful
    exploit could allow the attacker to perform arbitrary actions with the
    privilege level of the affected user. The attacker could view and modify
    the device configuration.

    Note: The NX-API feature is disabled by default.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z

    This advisory is part of the February 2021 Cisco FXOS and NX-OS Software
    Security Advisory Bundled Publication. For a complete list of the
    advisories and links to them, see Cisco Event Response: February 2021 Cisco
    FXOS and NX-OS Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a vulnerable release of Cisco NX-OS Software and have the NX-API
    configured:

       MDS 9000 Series Multilayer Switches ( CSCvv92342 )
       Nexus 3000 Series Switches ( CSCvr82908 )
       Nexus 5500 Platform Switches ( CSCvu67365 )
       Nexus 5600 Platform Switches ( CSCvu67365 )
       Nexus 6000 Series Switches ( CSCvu67365 )
       Nexus 7000 Series Switches ( CSCvv92342 )
       Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvr82908 )

    Note: The NX-API feature is disabled by default.

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Determine the Device Configuration

    To determine whether an affected device is configured with the NX-API
    feature enabled, use the show feature | include nxapi command from the
    Cisco NX-OS CLI and verify that the feature is enabled. The following
    example shows the NX-API feature enabled on a device that is running Cisco
    NX-OS Software:

        nxos-switch# show feature | include nxapi
        nxapi                1        enabled

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower 1000 Series
       Firepower 2100 Series
       Firepower 4100 Series
       Firepower 9300 Security Appliances
       Nexus 1000 Virtual Edge for VMware vSphere
       Nexus 1000V Switch for Microsoft Hyper-V
       Nexus 1000V Switch for VMware vSphere
       Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
        (ACI) mode
       UCS 6200 Series Fabric Interconnects
       UCS 6300 Series Fabric Interconnects
       UCS 6400 Series Fabric Interconnects

Details

  o On Cisco Nexus switches, CLIs are run only on the switches. The NX-API CLI
    is an enhancement to the Cisco NX-OS CLI system, which supports XML output.
    The NX-API CLI has the following features:

       Can be used on the switches
       Supports the JSON output format for specific commands
       Makes the CLIs available outside of the switch by using HTTP/HTTPS
       Supports show commands, configurations, and Linux Bash

Workarounds

  o There are no workarounds that address this vulnerability.

    However, because a device is not affected by this vulnerability if the
    NX-API is not configured, administrators may consider disabling the NX-API
    as a mitigation.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Cisco NX-OS Software

    To help customers determine their exposure to vulnerabilities in Cisco
    NX-OS Software, Cisco provides the Cisco Software Checker to identify any
    Cisco Security Advisories that impact a specific Cisco NX-OS Software
    release and the earliest release that fixes the vulnerabilities that are
    described in each advisory ("First Fixed"). If applicable, the tool also
    returns the earliest release that fixes all the vulnerabilities described
    in all the advisories identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software, platform, and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories or one or more specific advisories.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by choosing the Cisco NX-OS
    Software and platform and then entering a release-for example, 7.0(3)I7(5) 
    for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software
    in ACI mode.

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker and check the Medium check box in the drop-down list
    under Impact Rating when customizing a search.

    Cisco Nexus 7000 Series Switches SMUs

    For Cisco Nexus 7000 Series Switches, SMUs are available for Cisco NX-OS
    Software Release 8.2(6). Download the following SMUs from the Software
    Center on Cisco.com:

       n7000-s2-dk9.8.2.6.CSCvx15395.bin
       n7700-s2-dk9.8.2.6.CSCvx15395.bin

    For details about downloading and installing SMUs in Cisco NX-OS Software
    for Cisco Nexus 7000 Series Switches, see the Performing Software
    Maintenance Upgrades section of the Cisco Nexus 7000 Series NX-OS System
    Management Configuration Guide .

    Additional Resources

    For help determining the best Cisco NX-OS Software release for a Cisco
    Nexus Switch, see the following Recommended Releases documents. If a
    security advisory recommends a later release, Cisco recommends following
    the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS Software, see the Recommended
    Releases documents in the release notes for the device.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security
    Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-FEB-24  |
    +----------+---------------------------+----------+--------+--------------+


- --------------------------------------------------------------------------------


Cisco NX-OS Software Protocol Independent Multicast Denial of Service
Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-nxos-pim-dos-Y8SjMz4
First Published: 2021 February 24 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv98438
CVE Names:       CVE-2021-1367
CWEs:            CWE-20

Summary

  o A vulnerability in the Protocol Independent Multicast (PIM) feature of
    Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to
    cause a denial of service (DoS) condition on an affected device.

    This vulnerability is due to insufficient input validation. An attacker
    could exploit this vulnerability by sending a crafted PIM packet to an
    affected device. A successful exploit could allow the attacker to cause a
    traffic loop, resulting in a DoS condition.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco Nexus 9500
    R-Series Switching Platforms if they were running a vulnerable release of
    Cisco NX-OS Software and had the feature pim command configured.

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Note: No other Cisco Nexus 9000 Series Switches in standalone NX-OS mode
    are affected by this vulnerability.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower 1000 Series
       Firepower 2100 Series
       Firepower 4100 Series
       Firepower 9300 Security Appliances
       MDS 9000 Series Multilayer Switches
       Nexus 1000 Virtual Edge for VMware vSphere
       Nexus 1000V Switch for Microsoft Hyper-V
       Nexus 1000V Switch for VMware vSphere
       Nexus 3000 Series Switches
       Nexus 5500 Platform Switches
       Nexus 5600 Platform Switches
       Nexus 6000 Series Switches
       Nexus 7000 Series Switches
       Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
        (ACI) mode
       UCS 6200 Series Fabric Interconnects
       UCS 6300 Series Fabric Interconnects
       UCS 6400 Series Fabric Interconnects

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Cisco NX-OS Software

    To help customers determine their exposure to vulnerabilities in Cisco
    NX-OS Software, Cisco provides the Cisco Software Checker to identify any
    Cisco Security Advisories that impact a specific Cisco NX-OS Software
    release and the earliest release that fixes the vulnerabilities that are
    described in each advisory ("First Fixed"). If applicable, the tool also
    returns the earliest release that fixes all the vulnerabilities described
    in all the advisories identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software, platform, and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories or one or more specific advisories.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by choosing the Cisco NX-OS
    Software and platform and then entering a release-for example, 7.0(3)I7(5) 
    for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software
    in ACI mode.

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker and check the Medium check box in the drop-down list
    under Impact Rating when customizing a search.

    Additional Resources

    For help determining the best Cisco NX-OS Software release for a Cisco
    Nexus Switch, see the following Recommended Releases documents. If a
    security advisory recommends a later release, Cisco recommends following
    the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS Software, see the Recommended
    Releases documents in the release notes for the device.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-FEB-24  |
    +----------+---------------------------+----------+--------+--------------+


- --------------------------------------------------------------------------------


Cisco NX-OS Software Unauthenticated Arbitrary File Actions Vulnerability

Priority:        Critical
Advisory ID:     cisco-sa-3000-9000-fileaction-QtLzDRy2
First Published: 2021 February 24 16:00 GMT
Version 1.0:     Final
Workarounds:     Yes
Cisco Bug IDs:   CSCvw89875
CVE Names:       CVE-2021-1361
CWEs:            CWE-552

Summary

  o A vulnerability in the implementation of an internal file management
    service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series
    Switches in standalone NX-OS mode that are running Cisco NX-OS Software
    could allow an unauthenticated, remote attacker to create, delete, or
    overwrite arbitrary files with root privileges on the device.

    This vulnerability exists because TCP port 9075 is incorrectly configured
    to listen and respond to external connection requests. An attacker could
    exploit this vulnerability by sending crafted TCP packets to an IP address
    that is configured on a local interface on TCP port 9075. A successful
    exploit could allow the attacker to create, delete, or overwrite arbitrary
    files, including sensitive files that are related to the device
    configuration. For example, the attacker could add a user account without
    the device administrator knowing.

    Cisco has released software updates that address this vulnerability. There
    are workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2

    This advisory is part of the February 2021 Cisco FXOS and NX-OS Software
    Security Advisory Bundled Publication. For a complete list of the
    advisories and links to them, see Cisco Event Response: February 2021 Cisco
    FXOS and NX-OS Software Security Advisory Bundled Publication .

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    Cisco NX-OS Software Release 9.3(5) or Release 9.3(6):

       Nexus 3000 Series Switches
       Nexus 9000 Series Switches in standalone NX-OS mode

    These devices are vulnerable by default.

    To check a device, use the show sockets connection | include 9075 CLI
    command. If the command returns output, as shown in the following example,
    the device is vulnerable:

        nexus# show sockets connection | include 9075
        tcp LISTEN 0 32 * : 9075
        
    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       Firepower 1000 Series
       Firepower 2100 Series
       Firepower 4100 Series
       Firepower 9300 Security Appliances
       MDS 9000 Series Multilayer Switches
       Nexus 1000 Virtual Edge for VMware vSphere
       Nexus 1000V Switch for Microsoft Hyper-V
       Nexus 1000V Switch for VMware vSphere
       Nexus 5500 Platform Switches
       Nexus 5600 Platform Switches
       Nexus 6000 Series Switches
       Nexus 7000 Series Switches
       Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
        (ACI) mode
       UCS 6200 Series Fabric Interconnects
       UCS 6300 Series Fabric Interconnects
       UCS 6400 Series Fabric Interconnects

Workarounds

  o Using infrastructure access control lists (iACLs) to allow only strictly
    required management and control plane traffic that is destined to the
    affected device, as recommended in the Cisco Guide to Securing NX-OS
    Software Devices , would prevent remote exploitation of this vulnerability.
    Customers are advised to explicitly deny all TCP packets that are destined
    to a locally configured IP address with a destination port of 9075 as part
    of their iACLs. A customized control plane policing (CoPP) policy may also
    be used to drop all TCP port 9075 traffic that is destined to an affected
    device.

    Customers are advised to first evaluate the impact of configuration changes
    to the device and their security policy. Customers who are concerned about
    undesired or unexpected side effects are advised to contact their support
    organization before implementing configuration changes.

    In addition, local exploitation of this vulnerability is possible if the
    NX-OS features bash or guestshell are enabled. There is no workaround or
    mitigation for a local attacker with valid device credentials; however,
    customers are advised to follow best practices for account management as
    outlined in the Cisco Guide to Securing NX-OS Software Devices - Use
    Authentication, Authorization, and Accounting .

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Cisco NX-OS Software

    To help customers determine their exposure to vulnerabilities in Cisco
    NX-OS Software, Cisco provides the Cisco Software Checker to identify any
    Cisco Security Advisories that impact a specific Cisco NX-OS Software
    release and the earliest release that fixes the vulnerabilities that are
    described in each advisory ("First Fixed"). If applicable, the tool also
    returns the earliest release that fixes all the vulnerabilities described
    in all the advisories identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software, platform, and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories or one or more specific advisories.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by choosing the Cisco NX-OS
    Software and platform and then entering a release-for example, 7.0(3)I7(5) 
    for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software
    in ACI mode.

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker and check the Medium check box in the drop-down list
    under Impact Rating when customizing a search.

    Cisco Nexus 3000 and 9000 Series Switches SMUs

    For Cisco Nexus 3000 and 9000 Series Switches, SMUs are available for Cisco
    NX-OS Software Release 9.3(6). Customers can download the following SMU
    from the Software Center on Cisco.com:
    nxos.CSCvw89875-n9k_ALL-1.0.0-9.3.6.lib32_n9000.rpm.

    For details about downloading and installing SMUs in Cisco NX-OS Software
    for these Cisco Nexus Switches, see the Performing Software Maintenance
    Upgrades section of the appropriate NX-OS system management configuration
    guide:

       Cisco Nexus 3000 Series Switches
       Cisco Nexus 9000 Series Switches

    Additional Resources

    For help determining the best Cisco NX-OS Software release for a Cisco
    Nexus Switch, see the following Recommended Releases documents. If a
    security advisory recommends a later release, Cisco recommends following
    the advisory guidance.

        Cisco MDS Series Switches
        Cisco Nexus 1000V for VMware Switch
        Cisco Nexus 3000 Series Switches
        Cisco Nexus 5500 Platform Switches
        Cisco Nexus 5600 Platform Switches
        Cisco Nexus 6000 Series Switches
        Cisco Nexus 7000 Series Switches
        Cisco Nexus 9000 Series Switches
        Cisco Nexus 9000 Series ACI-Mode Switches

    To determine the best release for Cisco UCS Software, see the Recommended
    Releases documents in the release notes for the device.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank an anonymous reporter for finding this
    vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security
    Advisory Bundled Publication

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-FEB-24  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYDdJD+NLKJtyKPYoAQiLlA//cZoU2s/WRVAg5X803sp3+qthwOGne+sK
PjGhOUzrcRazk6A32+VDP+kR4UCZg+TJUxbs/6AgDyZSPGss4F3OcRkNL/fQe6fu
iduZhTks/jkSGa2ZjPiG5U3l/5ufQnVIOrydHpFE1OYGjKxZi9klH0tGsl4Vxnid
mUXJuCZf3ZWt1dkELgHrtoZ86YbpJdlFn95N/yk4DMi1FT3oHY6pl6omdWTwfLsU
b+Y6U3ZfrRIHfFI7W9/+Rs+Gkpw92ZmgfYJAU2AJ2ID1raHiyfvIwLJpDYnMccmh
RxZ7BX79hKlptj3UbWjyT7WJ+wx3kjIkd0pd7g7j3FvKdx44UhBammGCtD/byOOt
v59tHm1KHKt3dH0O4Saw6lggfpzeB8CXXnSHsze2Tl1QdPpOMIMDbY0hWL6TMLwm
/9fF1Z0R85AtbjTUuJ+ZhYRxZ/uDSLTioScLlauih2a2276TNOTabT9y+Mkptyux
nw3BXrM9+RzReJ8cHWisGuV1upIawQ1Ab2Ywmcix5F1EP9U2JjKS0qeLxMboWrqS
W1XrOFQF0V8uUzkN/qDVbX/TqRJtHZg8DdTELdhQJbU1wvc0Eks26ej00vwJWj2Z
xHTG04g8dJnVi6DF12iZCEdpJxSszKAi6tkXQiDsOKulYHNqEYSVdG4nuZI7nxxv
/ezfwQRebN8=
=Bnnd
-----END PGP SIGNATURE-----