COMMAND
cisco 76x buffer overflow
SYSTEMS AFFECTED
CISCO 7xx running IOS/700 software version 4.1(1), 4.1(2), or
4.1 interim releases earlier than 4.1(2.1)
PROBLEM
Laslo Orto found following. He found a buffer overflow in the
cisco 76x series router. The bug exists only in the 4 users limit
software. It was not possible to reproduce it with the unlimited
version. According to Cisco, some Cisco 7xx routers can be
crashed by connecting with TELNET and typing very long password
strings. There exists a possibility that this bug could be
exploited to take complete control of the router, rather than
simply crashing it. In order to exploit the vulnerability, an
attacker must have access to the password prompt. This means that
the attacker must be able to TELNET to the target router, or to
gain access to its console port. This vulnerability allows
attackers to force 7xx routers to reboot, denying service to
legitimate users during the reboot period, and possibly causing
excessive "call flapping" as routers shut down and restart.
It is possible that including the right data at the right place in
the too-long password string could enable an attacker to take
complete control of the router. A person who succeeded in such an
attack would be able to reconfigure the router or modify its
functionality, theoretically in any way at all. The exploit is
prety simple:
telnet cisco762.domain.com
Trying 1.2.3.4...
Connected to 1.2.3.4.
Escape character is '^]'.
Enter Password:Enter a
veryyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
yyyyyyyyyyyyyyyyyyyyyyyyyyyy long string here
and watch the prety lights go on as the cisco reboots.
SOLUTION
All Cisco 7xx routers Systems running releases earlier than 4.1
are not affected. Cisco is presently testing a software fix for
this problem. Fix is expected to be ready for customer use by
December 24, 1997. URL to check is:
http://www.cisco.com/warp/public/770/pwbuf-pub.shtml
The vulnerability may be avoided by controlling access to the
system console port, and by restricting access to the TELNET
facility to trusted hosts. TELNET access may be restricted either
by using filters on firewalls or surrounding routers, or by using
filters on the 7xx router itself. To restrict access to the TELNET
service on a 7xx router running 4.1(x) software to a single
trusted management host, use the command:
set ip filter tcp in source = not trusted-ip-address destination = 7xx-address:23 block
The command should be applied in every profile that may be active
when the router is connected to a potentially hostile network.