受影响系统:
Cisco IOS XR 3.x
Cisco IOS 12.3
Cisco IOS 12.2
Cisco IOS 12.1
Cisco IOS 12.0
描述:
Cisco IOS是Cisco网络设备中所使用的操作系统。
Cisco IOS和Cisco IOS XR在处理包含Type 0路由头的特制IPv6报文时存在漏洞,可能导致在受影响的IOS和IOS XR设备上出现信息泄露或受影响的IOS设备崩溃。
成功利用本文所述漏洞会导致在IPv6报文头中目标IPv6地址与距离报文缓冲区内存16字节处相互交换内存,这样就以IPv6目标地址的形式从缓冲区内存泄露数据,通过这个漏洞所访问的内存不会高于报文头起始处1500个字节。对于运行Cisco IOS的设备,最严重的情况是IOS设备完全崩溃;对于运行Cisco IOS XR的设备,成功攻击不会导致整个设备崩溃,而是导致IPv6子系统重启。反复的成功攻击会导致所有使用IPv6做为传输协议的所有上层服务持续的拒绝服务,但不是整个设备拒绝服务。
<*来源:Tom Cross
链接:http://secunia.com/advisories/26359/ http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-IPv6-leak.shtml
*>
建议:
临时解决方法:
* 应用以下控制面整型(CoPP):
!-- Permit all IPv6 Routing Header Type 0 (Source Route) packets
!-- sent to any IPv6 address configured on interfaces of the
!-- affected device or IPv6 link-local addresses. This traffic
!-- will be policed and dropped by the CoPP feature.
!
ipv6 access-list DENY-IPv6-RH0
permit ipv6 any any routing-type 0
!
!-- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
!-- traffic in accordance with existing security policies and
!-- configurations for traffic that is authorized to be sent
!-- to infrastructure devices.
!
!-- Create a Class-Map for traffic to be policed by the CoPP feature.
!
class-map match-all drop-IPv6-RH0-class
match access-group name DENY-IPv6-RH0
!
!-- Create a Policy-Map that will be applied to the Control-Plane of
!-- the device.
policy-map drop-IPv6-RH0-traffic
原文出自【比特网】,转载请保留原文链接:http://sec.chinabyte.com/266/11437766.shtml