Ispravljeno je nekoliko sigurnosnih nedostataka u operacijskom sustavu Cisco IOS, programskoj podršci koju koristi većina Cisco usmjernika i mrežnih preklopnika. Neki od propusta su rezultat pogrešaka vezanih uz obradu IRC prometa, SIP REGISTER poruka, H.323 implementaciju, CME (eng. CallManager Express) i nepravilno upravljanje certifikatima. Propusti se mogu iskorištavati lokalno, a rezultat uspješnog napada je izvođenje DoS napada ili zaobilaženje postavljenih zabrana. Korisnicima se savjetuje korištenje nadogradnje.

Cisco IOS Multiple Vulnerabilities
Secunia Advisory 	SA42917 	
Release Date 	2011-01-17
Criticality level 	Less criticalLess critical
Impact 	Security Bypass
DoS
Where 	From local network
Authentication level 	Available in Customer Area
  	 
Report reliability 	Available in Customer Area
Solution Status 	Vendor Patch
  	 
Systems affected 	Available in Customer Area
Approve distribution 	Available in Customer Area
  	 
Operating System	
	Cisco IOS 15.0

Secunia CVSS Score 	Available in Customer Area
CVE Reference(s) 	CVE-2009-5038 CVSS available in Customer Area
CVE-2009-5040 CVSS available in Customer Area
CVE-2010-4683 CVSS available in Customer Area
CVE-2010-4685 CVSS available in Customer Area
CVE-2010-4686 CVSS available in Customer Area
	   	

Description
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).

1) An error when processing certain IRC traffic can be exploited to cause a device reload by accessing an IRC channel within 36 hours of a reload.

2) An error in the CME (Communication Manager Express) component when handling a SNR number change menu from an extension mobility phone can be exploited to crash the device.

3) A memory leak when processing UDP SIP REGISTER packets can be exploited to exhaust memory resources via a specially crafted SIP packet.

4) An error in the PKI implementation does not clear the public key cache for the peers when the certificate map is changed. This can be exploited to reconnect and bypass the certificate ban.

5) A memory fragmentation error in the CME (Communication Manager Express) component when handling SIP TRUNK traffic can be exploited to exhaust memory resources via specially crafted SIP packets.

Solution
Update to Cisco IOS version 15.0(1)XA5.

Provided and/or discovered by
Reported by the vendor.

Original Advisory
Cisco:
http://www.cisco.com/en/US/docs/ios/15_0/15_0x/15_01_XA/rn800xa.pdf

Deep Links
Links available in Customer Area

Idi na vrh