Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14262
HistorySep 14, 2006 - 12:00 a.m.

Re: Cisco IOS VTP issues

2006-09-1400:00:00
vulners.com
28

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,
This is a Cisco response to an advisory published by FX of Phenoelit
posted as of September 13, 2006 at:
http://www.securityfocus.com/archive/1/445896/30/0/threaded
and entitled "Cisco Systems IOS VTP multiple vulnerabilities".

An official response is located at:
http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml

These vulnerabilities are addressed by Cisco bug IDs:

  • CSCsd52629/CSCsd34759 – VTP version field DoS

  • CSCse40078/CSCse47765 – Integer Wrap in VTP revision

  • CSCsd34855/CSCei54611 – Buffer Overflow in VTP VLAN name

We would like to thank FX and Phenoelit Group for reporting these
vulnerabilities to us. We greatly appreciate the opportunity to work
with researchers on security vulnerabilities, and welcome the
opportunity to review and assist in security vulnerability reports
against Cisco products.

Additional Information

VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that
maintains VLAN configuration consistency by managing the addition,
deletion, and renaming of VLANs on a network-wide basis. When you
configure a new VLAN on one VTP server, the VLAN configuration
information is distributed via the VTP protocol through all switches
in the domain. This reduces the need to configure the same VLAN
everywhere. VTP is a Cisco-proprietary protocol that is available on
most of the Cisco Catalyst series products in both Cisco IOS and
Cisco CatOS system software.

Products affected by these vulnerabilities:
±-----------------------------------------

  • Switches running affected versions of Cisco IOS and have VTP
    Operating Mode as either "server" or "client" are affected by all
    three vulnerabilities.
  • Switches running affected versions of Cisco CatOS and have VTP
    Operating Mode as either "server" or "client" are only affected
    by "Integer Wrap in VTP revision" vulnerability.

Products not affected by these vulnerabilities:
±---------------------------------------------

  • Switches configured with VTP operating mode as "transparent".
  • Switches running CatOS with VTP Operating Mode as either "server"
    or "client" are not affected by "Buffer Overflow in VTP VLAN
    name" or "VTP Version field DoS" vulnerabilities

To determine the VTP mode on the switch, log into the device and
issue the "show vtp status" (IOS) or "show vtp domain" (CatOS)
command. Switches that show either "Server" or "Client" as the VTP
operating mode are affected by these vulnerabilities.

An example is shown below for Cisco IOS with VTP operating in
"Server" mode:

ios_switch#sh vtp stat  
VTP Version                     : 2
Configuration Revision          : 0
Maximum VLANs supported locally : 1005
Number of existing VLANs        : 5
VTP Operating Mode              : Server
VTP Domain Name                 : test
VTP Pruning Mode                : Disabled
VTP V2 Mode                     : Enabled
VTP Traps Generation            : Disabled
MD5 digest                      : <removed> 
Configuration last modified by 0.0.0.0 at 3-1-93 04:02:09
ios_switch#

An example is shown below for Cisco CatOS with VTP operating in
"Server" mode:

catos_switch> (enable) sh vtp domain
Version      : running VTP1 (VTP3 capable)
Domain Name  : test              Password  : not configured
Notifications: disabled          Updater ID: 0.0.0.0

Feature        Mode           Revision
-------------- -------------- -----------
VLAN           Server         2          

Pruning             : disabled
VLANs prune eligible: 2-1000
catos_switch> (enable) 
  • VTP Version field DoS:

    The VTP feature in certain versions of Cisco IOS software may be
    vulnerable to a crafted packet sent from the local network
    segment which may lead to a denial of service condition. When a
    switch receives a specially crafted VTP summary packet, the
    switch will reset with a Software Forced Crash Exception.
    Messages for either "watchdog timeout" or "CPU hog" for process
    VLAN Manager will be seen prior to the software reset within the
    syslog messages generated by the switch.
    The packets must be received on a trunk enabled port.

    Switches running CatOS are not affected by this vulnerability and
    will display a log message "%VTP-2-RXINVSUMMARY:rx invalid
    summary from [port number]" should a specially crafted summary
    packet be received.

    There are no workarounds for this vulnerability. Switches
    configured with a VTP domain password are still affected by this
    vulnerability. Cisco recommends that customer upgrade to a
    version of Cisco IOS that contains the fixes for either
    CSCsd52629 or CSCsd34759.

  • Buffer Overflow in VTP VLAN name:

    The VTP feature in certain versions of Cisco IOS software is
    vulnerable to a buffer overflow condition and potential execution
    of arbitrary code. If a VTP summary advertisement is received
    with a Type-Length-Value (TLV) containing a VLAN name greater
    than 100 characters, the receiving switch will reset with an
    Unassigned Exception error. The packets must be received on a
    trunk enabled port, with a matching domain name and a matching
    VTP domain password (if configured).

    Applying a VTP domain password to the VTP domain will prevent
    spoofed VTP summary advertisement message from advertising an
    incorrect VLAN name. See http://www.cisco.com/univercd/cc/td/doc/
    product/lan/c3550/12119ea1/3550scg/swvtp.htm#1035247 for further
    information on setting VTP domain passwords.

  • Integer Wrap in VTP revision:

    The VTP feature in certain versions of Cisco IOS software and
    Cisco CatOS software will display statistic counters as a
    negative number due to an integer wrap. Normal VTP operation will
    occur if no changes are made within the VTP domain. With the
    addition of switches or resetting of a VTP server configuration
    revision, VTP updates potentially may not be processed by other
    VTP servers/clients within the domain. Should any switches be
    impacted by this vulnerability, customers should execute the
    recovery procedures as listed below.

    Once the VTP configuration revision exceeds 0x7FFFFFFF, the
    output for the VTP configuration revision in "show vtp status"
    (IOS) or "show vtp domain" (CatOS) will display as a negative
    number. Operation of the switch is not affected, however further
    changes to the VLAN database may not be properly propagated
    throughout the VTP domain.

    Example from Cisco IOS:

    ios_switch#sh vtp stat
    VTP Version                     : 2
    Configuration Revision          : -2147483648
    Maximum VLANs supported locally : 1005
    Number of existing VLANs        : 17
    VTP Operating Mode              : Client
    VTP Domain Name                 : psirt
    VTP Pruning Mode                : Disabled
    VTP V2 Mode                     : Disabled
    VTP Traps Generation            : Disabled
    MD5 digest                      : <removed> 
    Configuration last modified by 0.0.0.0 at 3-1-93 00:10:07
    ios_switch#
    

    Example from Cisco CatOS:

    catos_switch# (enable) sh vtp domain
    Version      : running VTP1 (VTP3 capable)
    Domain Name  : psirt             Password  : not configured
    Notifications: disabled          Updater ID: 0.0.0.0
    
    Feature        Mode           Revision
    -------------- -------------- -----------
    VLAN           Server         -2147483648
    
    Pruning             : disabled
    VLANs prune eligible: 2-1000
    

    Applying a VTP domain password to the VTP domain will prevent
    spoofed VTP summary advertisement messages from advertising
    0x7FFFFFFF as a configuration revision number. See http://
    www.cisco.com/univercd/cc/td/doc/product/lan/c3550/12119ea1/
    3550scg/swvtp.htm#1035247 for further information on setting VTP
    domain passwords

    To recover from the negative configuration revision due to
    exploitation, the following methods can be performed to recover
    the VTP domain operations:

    • Change VTP domain names on all switches.

    • Change all VTP servers/clients to transparent mode first. Then
      change back to their original server/client mode.

For further information on VTP please refer to:
http://www.cisco.com/warp/public/473/21.html

For further information on Layer 2 security practices please refer
to:
http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/
networking_solutions_white_paper09186a008014870f.shtml#wp998892

Regards
Paul Oxman
PSIRT Incident Manager
Cisco Systems

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (SunOS)

iD8DBQFFCE4G8NUAbBmDaxQRAuIDAJ9t5ReIlSTSbag3CAIwZkaeX03BiQCdECvp
guqCOs3Ye94iIwOSl/m4Ou8=
=5viy
-----END PGP SIGNATURE-----