[82837] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco IOS Exploit Cover Up

daemon@ATHENA.MIT.EDU (Guru (Gurumurthy) Yeleswarapu)
Fri Jul 29 17:28:48 2005

Date: Fri, 29 Jul 2005 14:28:11 -0700
From: "Guru (Gurumurthy) Yeleswarapu" <guruy@broadcom.com>
To: nanog@merit.edu
Errors-To: owner-nanog@merit.edu


I just happened to see this :

Last month, a company called Internet Security Systems (ISS) issued an =
alert
to warn users that Cisco's VoIP offering had a security flaw that would =
allow
just that. According to the company, this implementation flaw in Cisco's =
Call
Manager, which handles call signaling and routing, could allow a buffer
overflow that would grant an intruder access to the system to listen in =
on
all calls routed through it.

This is one scenario described by ISS and other vendors focused on =
selling
technology to plug the security holes in VoIP, a method for sending =
voice
traffic over IP that many say was not designed with security in mind. =
ISS and
its competitors, which come to this new field largely from the VoIP
management and IP security markets, forecast big risks for companies =
that
don't take VoIP security seriously, and undoubtedly look forward to
formidable revenue streams generated by those that do. =20

Guru

-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of =
Janet
Sullivan
Sent: Friday, July 29, 2005 12:44 PM
To: swm@emanon.com; nanog@merit.edu
Subject: Re: Cisco IOS Exploit Cover Up


Scott Morris wrote:
> And quite honestly, we can probably be pretty safe in assuming they=20
> will not be running IPv6 (current exploit) or SNMP (older exploits) or =

> BGP (other
> exploits) or SSH (even other exploits) on that box.  :)  (the 1601 or=20
> the
> 2500's)

If a worm writer wanted to cause chaos, they wouldn't target 2500s, but
7200s, 7600s, GSRs, etc.

The way I see it, all that's needed is two major exploits, one known by
Cisco, one not.

Exploit #1 will be made public.  Cisco will released fixed code.  Good
service providers will upgrade.

The upgraded code version will be the one targeted by the second, =
unknown,
exploit.

A two-part worm can infect Windows boxen via any common method, and then =

use them to try the exploit against routers.   A windows box can find=20
routers to attack easily enough by doing traceroutes to various sites.=20
Then, the windows boxen can try a limited set of exploit variants on =
each
router.  Not all routers will be affected, but some will.

As for what the worm could do - well, it could report home to the worm
creators that "Hey, you 0wn X number of routers", or it could do =
something
fun like erasing configs and locking out console ports. ;-)

Honestly, I've been expecting something like that to happen for years =
now.
<shrug>




home help back first fref pref prev next nref lref last post