ID

VAR-200609-0179


CVE

CVE-2006-4775


TITLE

Cisco IOS contains buffer overflow in VTP VLAN name handling

Trust: 0.8

sources: CERT/CC: VU#542108

DESCRIPTION

The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context. Cisco IOS fails to properly verify the VTP configuration revision number. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Cisco IOS Is VLAN Trunk protocol (VTP) There are several security issues in the implementation of: 1) VTP Included in packet VTP There is a flaw in the processing of the version field, so if an inappropriate value is set, the processing will go into a loop and the device will be reset. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. Cisco IOS is prone to multiple vulnerabilities when handling VLAN Trunking Protocol (VTP) packets. These issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. Attackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. By exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. Cisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. From this point on the switch cannot communicate with the changed VLAN configuration, as all other switches will reject the generated update, 3 VLAN name heap overflow If an attacker is able to send VTP updates to the Cisco IOS device, type 2 frames contain record of. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. If the updated VLAN name is larger than 100 bytes and the VLAN name length field is correct, it will cause a heap overflow and execute arbitrary code on the receiving switch. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Cisco IOS VTP Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21896 VERIFY ADVISORY: http://secunia.com/advisories/21896/ CRITICAL: Moderately critical IMPACT: Manipulation of data, DoS, System access WHERE: >From local network OPERATING SYSTEM: Cisco IOS 10.x http://secunia.com/product/184/ Cisco IOS 11.x http://secunia.com/product/183/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R11.x http://secunia.com/product/53/ Cisco IOS R12.x http://secunia.com/product/50/ DESCRIPTION: FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. This can be exploited to reset the switch with a Software Forced Crash Exception by sending a specially crafted packet to a trunk enabled port. 2) An integer overflow error exists in the VTP configuration revision handling. 3) A boundary error exists in the processing of VTP summary advertisement messages. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted message containing an overly long VLAN name (more than 100 characters) to a trunk enabled port. NOTE: The packets must be received with a matching domain name and a matching VTP domain password (if configured). SOLUTION: A fix is reportedly available for vulnerability #1. The vendor also recommends applying a VTP domain password to the VTP domain (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: FX, Phenoelit. ORIGINAL ADVISORY: Phenoelit: http://www.phenoelit.de/stuff/CiscoVTP.txt Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.6

sources: NVD: CVE-2006-4775 // CERT/CC: VU#542108 // CERT/CC: VU#175148 // JVNDB: JVNDB-2006-000552 // BID: 19998 // VULHUB: VHN-20883 // PACKETSTORM: 50047 // PACKETSTORM: 50048

AFFECTED PRODUCTS

vendor:ciscomodel: - scope: - version: -

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1\(19\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catosscope: - version: -

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1(19)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#542108 // CERT/CC: VU#175148 // BID: 19998 // JVNDB: JVNDB-2006-000552 // CNNVD: CNNVD-200609-238 // NVD: CVE-2006-4775

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4775
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#542108
value: 22.74

Trust: 0.8

CARNEGIE MELLON: VU#175148
value: 3.37

Trust: 0.8

NVD: CVE-2006-4775
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200609-238
value: HIGH

Trust: 0.6

VULHUB: VHN-20883
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-4775
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20883
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#542108 // CERT/CC: VU#175148 // VULHUB: VHN-20883 // JVNDB: JVNDB-2006-000552 // CNNVD: CNNVD-200609-238 // NVD: CVE-2006-4775

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.1

sources: VULHUB: VHN-20883 // NVD: CVE-2006-4775

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200609-238

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200609-238

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000552

PATCH

title:cisco-sr-20060913-vtpurl:http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2006-000552

EXTERNAL IDS

db:SECUNIAid:21896

Trust: 3.4

db:CERT/CCid:VU#175148

Trust: 3.3

db:BIDid:19998

Trust: 2.8

db:SECUNIAid:21902

Trust: 2.6

db:NVDid:CVE-2006-4775

Trust: 2.5

db:VUPENid:ADV-2006-3600

Trust: 1.7

db:OSVDBid:28776

Trust: 1.7

db:SECTRACKid:1016843

Trust: 1.7

db:CERT/CCid:VU#542108

Trust: 1.6

db:CERT/CCid:VU#821420

Trust: 0.8

db:JVNDBid:JVNDB-2006-000552

Trust: 0.8

db:CNNVDid:CNNVD-200609-238

Trust: 0.7

db:BUGTRAQid:20060913 RE: CISCO IOS VTP ISSUES

Trust: 0.6

db:BUGTRAQid:20060913 CISCO IOS VTP ISSUES

Trust: 0.6

db:CISCOid:20060913 CISCO VLAN TRUNKING PROTOCOL VULNERABILITIES

Trust: 0.6

db:XFid:28925

Trust: 0.6

db:VULHUBid:VHN-20883

Trust: 0.1

db:PACKETSTORMid:50047

Trust: 0.1

db:PACKETSTORMid:50048

Trust: 0.1

sources: CERT/CC: VU#542108 // CERT/CC: VU#175148 // VULHUB: VHN-20883 // BID: 19998 // JVNDB: JVNDB-2006-000552 // PACKETSTORM: 50047 // PACKETSTORM: 50048 // CNNVD: CNNVD-200609-238 // NVD: CVE-2006-4775

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml

Trust: 3.8

url:http://www.securityfocus.com/bid/19998

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/175148

Trust: 2.5

url:http://secunia.com/advisories/21896/

Trust: 1.8

url:http://www.phenoelit.de/stuff/ciscovtp.txt

Trust: 1.8

url:http://www.osvdb.org/28776

Trust: 1.7

url:http://securitytracker.com/id?1016843

Trust: 1.7

url:http://secunia.com/advisories/21896

Trust: 1.7

url:http://secunia.com/advisories/21902

Trust: 1.7

url:http://www.phenoelit.de/stuff/ciscovtp.txt

Trust: 1.6

url:http://www.cisco.com/en/us/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml#wp998892

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2006/3600

Trust: 1.4

url:http://www.securityfocus.com/archive/1/445896/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/445938/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3600

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28925

Trust: 1.1

url:http://secunia.com/advisories/21902/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4775

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4775

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/821420

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/542108

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/445938/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/445896/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/28925

Trust: 0.6

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:/archive/1/445896

Trust: 0.3

url:/archive/1/445938

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.2

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/web_application_security_specialist/

Trust: 0.2

url:http://secunia.com/product/50/

Trust: 0.1

url:http://secunia.com/product/184/

Trust: 0.1

url:http://secunia.com/product/53/

Trust: 0.1

url:http://secunia.com/product/182/

Trust: 0.1

url:http://secunia.com/product/183/

Trust: 0.1

url:http://secunia.com/product/527/

Trust: 0.1

url:http://secunia.com/product/3564/

Trust: 0.1

url:http://secunia.com/product/185/

Trust: 0.1

url:http://secunia.com/product/526/

Trust: 0.1

sources: CERT/CC: VU#542108 // CERT/CC: VU#175148 // VULHUB: VHN-20883 // BID: 19998 // JVNDB: JVNDB-2006-000552 // PACKETSTORM: 50047 // PACKETSTORM: 50048 // CNNVD: CNNVD-200609-238 // NVD: CVE-2006-4775

CREDITS

FX fx@phenoelit.de

Trust: 0.6

sources: CNNVD: CNNVD-200609-238

SOURCES

db:CERT/CCid:VU#542108
db:CERT/CCid:VU#175148
db:VULHUBid:VHN-20883
db:BIDid:19998
db:JVNDBid:JVNDB-2006-000552
db:PACKETSTORMid:50047
db:PACKETSTORMid:50048
db:CNNVDid:CNNVD-200609-238
db:NVDid:CVE-2006-4775

LAST UPDATE DATE

2024-08-14T13:50:41.746000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#542108date:2006-09-27T00:00:00
db:CERT/CCid:VU#175148date:2006-09-27T00:00:00
db:VULHUBid:VHN-20883date:2018-10-17T00:00:00
db:BIDid:19998date:2006-09-14T18:47:00
db:JVNDBid:JVNDB-2006-000552date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200609-238date:2006-09-18T00:00:00
db:NVDid:CVE-2006-4775date:2018-10-17T21:39:30.903

SOURCES RELEASE DATE

db:CERT/CCid:VU#542108date:2006-09-27T00:00:00
db:CERT/CCid:VU#175148date:2006-09-27T00:00:00
db:VULHUBid:VHN-20883date:2006-09-14T00:00:00
db:BIDid:19998date:2006-09-13T00:00:00
db:JVNDBid:JVNDB-2006-000552date:2007-04-01T00:00:00
db:PACKETSTORMid:50047date:2006-09-14T22:28:53
db:PACKETSTORMid:50048date:2006-09-14T22:28:53
db:CNNVDid:CNNVD-200609-238date:2006-09-13T00:00:00
db:NVDid:CVE-2006-4775date:2006-09-14T00:07:00