ID

VAR-199808-0020


TITLE

Cisco PIX and CBAC Fragmentation Attack

Trust: 0.3

sources: BID: 690

DESCRIPTION

Both the Cisco PIX Firewall software as the Context-based Access Control (CBAC) feature of Cisco's IOS Firewall Feature Set do not properly check non-initial fragmented IP packets. Although the non-initial fragmented IP packets might belong to session which would normally be blocked, they are forwarded to the destination host. This may lead to a denial of services (DOS) attack due to the exhaustion of resources required to keep track of the fragmented IP packets. The problem can be fixed by keeping track of the sessions that fragmented IP packets belong to and by blocking non-initial fragmented IP packets for which no initial packet has been seen. The DOS attack can easily be carried out by publically available tools.

Trust: 0.3

sources: BID: 690

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

sources: BID: 690

THREAT TYPE

network

Trust: 0.3

sources: BID: 690

TYPE

Serialization Error

Trust: 0.3

sources: BID: 690

EXTERNAL IDS

db:BIDid:690

Trust: 0.3

sources: BID: 690

REFERENCES

url:http://www.cisco.com/warp/public/707/sec_incident_response.shtml

Trust: 0.3

sources: BID: 690

CREDITS

This vulnerability was discovered by Robert Ståhlbrand <robert@nmac.ericsson.se> and reported to BugTraq on 18 August 1998.

Trust: 0.3

sources: BID: 690

SOURCES

db:BIDid:690

LAST UPDATE DATE

2022-05-17T02:03:06.105000+00:00


SOURCES UPDATE DATE

db:BIDid:690date:1998-08-18T00:00:00

SOURCES RELEASE DATE

db:BIDid:690date:1998-08-18T00:00:00