Wednesday, November 23, 2005

Cisco PIX Spoofed TCP SYN Packets Denial of Service Vulnerability

Via FrSIRT.

Advisory ID : FrSIRT/ADV-2005-2546
CVE ID : GENERIC-MAP-NOMATCH
Rated as : Low Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2005-11-23

Technical Description

A vulnerability has been identified in Cisco PIX, which may be exploited by remote attackers to cause a denial of service. This issue is due to an error where spoofed TCP SYN packets with incorrect checksums sent to the device are silently discarded without a RST reply from either the destination or the legitimate source, which will cause the firewall to hold a half-opened, embryonic connection open until the embryonic connection timeout

Because the firewall is holding a connection open, any additional packets with the same protocol, IP addresses, and ports will be treated as part of the existing half-open connection. In this case, a legitimate SYN packet following the malformed SYN will be discarded blocking legitimate TCP connections.

Exploits

http://www.frsirt.com/exploits/20051123.PIXdos.pl.php

Affected Products

Cisco PIX version 6.3
Cisco PIX/ASA version 7.0

Solution

- Execute the commands "clear xlate" or "clear local-host " to allow the firewall to pass connections again.

- Modify the default TCP embryonic connection timeout.

- Configure TCP Intercept to allow the PIX to proxy all TCP connection attempts originated from behind any firewall interface after the first connection.

- Configure PIX/ASA 7.0 to verify TCP checksums.

References

http://www.frsirt.com/english/advisories/2005/2546
http://www.frsirt.com/english/reference/1212
http://www.frsirt.com/english/reference/1164



0 Comments:

Post a Comment

<< Home