信息提供: 漏洞類別: 攻擊類型: 發布日期: 更新日期: 受影響系統: 安全系統: 無 漏洞報告人: 漏洞描述: BUGTRAQ ID: 5114 測試方法: 無 解決方法: 臨時解決方法:
安全公告(或線索)提供熱線:51cto.editor@gmail.com
遠程拒絕服務攻擊漏洞
遠程攻擊
2002-06-27
2002-07-05
Cisco Catalyst 6000 7.1(2)
Cisco Catalyst 6000 7.1
Cisco Catalyst 6000 6.3(4)
Cisco Catalyst 6000 6.3(0.7)PAN
Cisco Catalyst 6000 6.2(0.111)
Cisco Catalyst 6000 6.2(0.110)
Cisco Catalyst 6000 6.1(2.13)
Cisco Catalyst 6000 6.1(1c)
Cisco Catalyst 6000 6.1(1b)
Cisco Catalyst 6000 6.1(1a)
Cisco Catalyst 6000 6.1(1)
Cisco Catalyst 6000 5.5(4b)
Cisco Catalyst 6000 5.5(4a)
Cisco Catalyst 6000 5.5(4)
Cisco Catalyst 6000 5.5(3)
Cisco Catalyst 6000 5.5(2)
Cisco Catalyst 6000 5.5(1)
Cisco Catalyst 6000 5.5
Cisco Catalyst 6000 5.4.1
Cisco Catalyst 6000 5.4(4)
Cisco Catalyst 6000 5.4(3)
Cisco Catalyst 6000 5.4(2)
Cisco Catalyst 6000 5.4(1)
Cisco Catalyst 6000 5.4
Cisco Catalyst 6000 5.3(6)CSX
Cisco Catalyst 6000 5.3(5a)CSX
Cisco Catalyst 6000 5.3(5)CSX
Cisco Catalyst 6000 5.3(4)CSX
Cisco Catalyst 6000 5.3(3)CSX
Cisco Catalyst 6000 5.3(2)CSX
Cisco Catalyst 6000 5.3(1a)CSX
Cisco Catalyst 6000 5.3(1)CSX
Cisco IOS 12.2YH
Cisco IOS 12.2YG
Cisco IOS 12.2YF
Cisco IOS 12.2YD
Cisco IOS 12.2YC
Cisco IOS 12.2YB
Cisco IOS 12.2YA
Cisco IOS 12.2XW
Cisco IOS 12.2XT
Cisco IOS 12.2XS
Cisco IOS 12.2XR
Cisco IOS 12.2XQ
Cisco IOS 12.2XK
Cisco IOS 12.2XJ
Cisco IOS 12.2XI
Cisco IOS 12.2XH
Cisco IOS 12.2XG
Cisco IOS 12.2XF
Cisco IOS 12.2XE
Cisco IOS 12.2XD
Cisco IOS 12.2XB
Cisco IOS 12.2XA
Cisco IOS 12.2T
Cisco IOS 12.2DD
Cisco IOS 12.2
Cisco IOS 12.1YF
Cisco IOS 12.1YE
Cisco IOS 12.1YD
Cisco IOS 12.1YC
Cisco IOS 12.1XU
Cisco IOS 12.1XT
Cisco IOS 12.1XQ
Cisco IOS 12.1XP
Cisco IOS 12.1XM
Cisco IOS 12.1XL
Cisco IOS 12.1XJ
Cisco IOS 12.1XI
Cisco IOS 12.1XH
Cisco IOS 12.1XG
Cisco IOS 12.1XF
Cisco IOS 12.1XC
Cisco IOS 12.1XB
Cisco IOS 12.1T
Cisco IOS 12.1EC
Cisco IOS 12.1E
Cisco IOS 12.0XV
Cisco IOS 12.0XM
Cisco IOS 12.0XB
Cisco IOS 12.0ST
Cisco IOS 12.0SP
Cisco IOS 12.0S
Cisco PIX Firewall 6.2
Cisco PIX Firewall 6.1
Cisco PIX Firewall 6.0
Cisco PIX Firewall 5.3
Cisco PIX Firewall 5.2
Cisco CSS11000 Content Services Switch
Cisco Systems Product Security Incident Response Team
CVE(CAN) ID: CVE-2002-1024
IOS是一款由CISCO公司分發的使用在CISCO路由器上的Inte.net操作系統。
IOS系統中的SSH實現在處理超大SSH包時存在漏洞,遠程攻擊者可以利用這個漏洞進行拒絕服務攻擊。
當處理超大的信息包時,SSH進程會消耗大部分CPU指令周期,導致對正常通信停止響應,產生拒絕服務。在某些情況下可能導致CISCO設備重啟動。
此問題主要存在于ssh1守護程序中所帶的一段代碼中存在一個整數溢出問題。問題出在deattack.c,由于在detect_attack()函數中錯誤的將一個16位的無符號變量當成了32位變量來使用,導致表索引溢出問題而產生拒絕服務攻擊。
具體可參考SSH1 守護程序crc32補償攻擊檢測安全漏洞( http://security.nsfocus.com/showQuery.asp?bugID=1262 )
如果您不能立刻安裝補丁或者升級,NSFOCUS建議您采取以下措施以降低威脅:
* 在邊界網絡中使用訪問限制控制所有SSH連接。
* 每一個獨立的設備只允許合法的IP地址進行訪問,并阻塞所有來自其他IP的SSH連接。
廠商補?。?br />
Cisco
-----
Cisco已經為此發布了一個安全公告(Cisco-SSH-Scan)以及相應補丁:
Cisco-SSH-Scan:Scanning for SSH Can Cause a Crash
鏈接:http://www.cisco.com/warp/public/707/SSH-scanning.shtml
補丁下載:
CISCO已經提供PIX和IOS固件的升級版本,具體升級列表請參看:
http://www.cisco.com/warp/public/707/SSH-scanning.shtml#Software
原文轉自:http://www.anti-gravitydesign.com