COMMAND

    CISCO

SYSTEMS AFFECTED

    CISCO routers

PROBLEM

    Following info is based on CISCO Field Notice.  An error in  Cisco
    IOS  software  makes  it  possible  for untrusted, unauthenticated
    users who can gain access to the login prompt of a router or other
    Cisco IOS  device, via  any means,  to cause  that device to crash
    and reload.   This applies only  to devices running  classic Cisco
    IOS software.  This includes most Cisco routers with model numbers
    greater  than  or  equal  to  1000,  but  does not include the 7xx
    series, the Catalyst LAN  switches, WAN switching products  in the
    IGX or BPX lines,  the AXIS shelf, early  models of the LS1010  or
    LS2020 ATM switches, or any host-based software.  So, affected are
    all users of  classic Cisco IOS  software versions 9.1  and later,
    but earlier than the repaired versions listed below whose  devices
    can be connected to interactively by untrusted users, are affected
    by this vulnerability.  It is not necessary to be able to actually
    log  in  to  exploit  this  vulnerability;  simply  establishing a
    terminal connection is sufficient.

    The  vulnerability  can  be  exploited  using  direct  console  or
    asynchronous  serial  connections  (including dialup connections),
    TELNET connections, UNIX "r" command connections, LAT connections,
    MOP connections, X.29 connections, V.120 connections, and possibly
    others.     Except   in   extraordinary   security   environments,
    administrators  are  strongly  encouraged  to  assume that hostile
    users can find ways to make interactive connections to their Cisco
    IOS  devices.   If  attackers  know  the  details of the Cisco IOS
    software error they will be able to cause the router to crash  and
    reload  without  having  to  log  in  to the router.  Because this
    problem  involves  damage  to  an  internal  data  struture, it is
    possible that  other, more  subtle or  targeted effects  on system
    operation  could  also  be  induced  by proper exploitation.  Such
    exploitation, if it is possible at all, would require  significant
    engineering  skill  and  a  thorough  knowledge  of  the  internal
    operation  of  Cisco  IOS  software,  including Cisco trade secret
    information.

SOLUTION

    If you are  not running classic  Cisco IOS software,  then you are
    not affected  by this  vulnerability.   If you  are unsure whether
    your device is  running classic Cisco  IOS software, log  into the
    device  and  issue  the  command  show  version. Classic Cisco IOS
    software will  identify itself  simply as  "IOS" or  "Internetwork
    Operating  System  Software",  and  affected  software will have a
    version number greater than or equal to 9.1.  Other Cisco  devices
    either  will  not  have  the  show  version  command, or will give
    different  output.   This  vulnerability  affects  all releases of
    Classic Cisco IOS software from 9.1 up to, but not including,  the
    following  corrected   releases  (including   interim  and    beta
    software):

        11.3(1),  11.3(1)ED, 11.3(1)T
        11.2(10), 11.2(9)P, 11.2(9)XA, 11.2(10)BC
        11.1(15)CA, 11.1(16), 11.1(16)IA, 11.1(16)AA, 11.1(17)CC, 11.1(17)CT
        11.0(20.3)

    Releases  of  Cisco  IOS  software  up  to and including 10.3 have
    reached end of support, and  no fixes are currently or  planned to
    be  available  for  those  releases.  All  releases  after 9.1 do,
    however, contain  the problem.   All planned  fixes to  Cisco  IOS
    software  have  been  completed  and  tested.   Integration   into
    regular  released  software  is  complete  for all versions except
    11.0.  If you are running  a version of software earlier than  the
    ones listed above,  please contact the  Cisco TAC for  assistance.
    The fix for  this problem is  available for the  11.0 release only
    in the 11.0(20.3)  version.  This  is an interim  release, and has
    not been subjected to the same degree of testing as a regular  IOS
    release.  The first regular  11.0 release containing the fix  will
    be 11.0(21).   Cisco is  offering free  software upgrades  to  all
    vulnerable  customers,  regardless  of  contract status. Customers
    with  service  contracts  may  upgrade  to  any Cisco IOS software
    version.  Customers  without contracts may  upgrade to the  latest
    versions of the images that  they are already running.   Customers
    without  contracts  who  are  running  10.3 or older software will
    receive  free  upgrades  to  fixed  11.0  versions,  but should be
    careful  to  make  sure  that  their  hardware can support the new
    software before upgrading.