[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

INTERIM DECISION: ACCEPT 10 VEN-ROUTER candidates (Final 7/12)



I have made an Interim Decision to ACCEPT all the candidates from this
cluster.  A Final Decision is scheduled for July 12.

Observe CAN-1999-0060 which could be affected by the Same Codebase
content decision.  It identifies two different series of Ascend
routers, which to me is sufficient information to indicate that they
probably share the same codebase, and thus should not be split.  If
you object to this decision and have evidence that they are not the
same codebase, please speak up.

References were added as noted.

I have removed myself from all votes in the cases where I propose the
candidates.  However, I reserve the right to change my mind and
continue to MODIFY, REJECT, or REVIEW my candidates where
appropriate. ;-)

- Steve



Least controversial candidates are listed first.

Voters:
  Frech ACCEPT(3) MODIFY(7)
  Hill ACCEPT(10)
  Northcutt ACCEPT(10)


*************************
ACCEPT
*************************

=================================
Candidate: CAN-1999-0060
Published:
Final-Decision:
Interim-Decision: 19990712
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: NAI:NAI-26
Reference: XF:ascend-config-kill
Reference: ASCEND:http://www.ascend.com/2695.html

Attackers can cause a denial of service in Ascend MAX and Pipeline
routers with a malformed packet to the discard port, which is used by
the Java Configurator tool.

VOTES:
   ACCEPT(3) Northcutt, Hill, Frech


=================================
Candidate: CAN-1999-0160
Published:
Final-Decision:
Interim-Decision: 19990712
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/770/chapvuln-pub.shtml
Reference: XF:cisco-chap

Some classic Cisco IOS devices have a vulnerability in the PPP CHAP
authentication to establish unauthorized PPP connections.

VOTES:
   ACCEPT(3) Northcutt, Hill, Frech


=================================
Candidate: CAN-1999-0161
Published:
Final-Decision:
Interim-Decision: 19990712
Modified:
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/707/1.html
Reference: XF:cisco-acl-tacacs

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended
IP access control list could bypass filtering.

VOTES:
   ACCEPT(3) Northcutt, Hill, Frech




*************************
MODIFY
*************************

=================================
Candidate: CAN-1999-0157
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/770/nifrag.shtml
Reference: XF:cisco-fragmented-attacks

Cisco PIX firewall and CBAC IP fragmentation attack results in a
denial of service.

Modifications:
  ADDREF XF:cisco-fragmented-attacks

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-fragmented-attacks


=================================
Candidate: CAN-1999-0158
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/770/pixmgrfile-pub.shtml
Reference: XF:cisco-pix-file-exposure

Cisco PIX firewall manager (PFM) on Windows NT allows attackers to
connect to port 8080 on the PFM server and retrieve any file whose
name and location is known.

Modifications:
  ADDREF Reference: XF:cisco-pix-file-exposure

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-pix-file-exposure


=================================
Candidate: CAN-1999-0159
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/770/ioslogin-pub.shtml
Reference: XF:cisco-ios-crash

Attackers can crash a Cisco IOS router or device, provided they can
get to an interactive prompt (such as a login).  This applies to some
IOS 9.x, 10.x, and 11.x releases.

Modifications:
  ADDREF Reference: XF:cisco-ios-crash

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-ios-crash


=================================
Candidate: CAN-1999-0162
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/707/2.html
Reference: XF:cisco-acl-established

The "established" keyword in some Cisco IOS software allowed
an attacker to bypass filtering.

Modifications:
  ADDREF XF:cisco-acl-established

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-acl-established


=================================
Candidate: CAN-1999-0293
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:http://www.cisco.com/warp/public/770/aaapair-pub.shtml
Reference: XF:cisco-ios-aaa-auth

AAA authentication on Cisco systems allows attackers to execute
commands without authorization.

Modifications:
  ADDREF XF:cisco-ios-aaa-auth

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-ios-aaa-auth


=================================
Candidate: CAN-1999-0430
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: ISS:Remote Denial of Service Vulnerability in Cisco Catalyst Series Ethernet Switches
Reference: CISCO:Cisco Catalyst Supervisor Remote Reload
Reference: XF:cisco-catalyst-crash

Cisco Catalyst LAN switches running Catalyst 5000 supervisor software
allows remote attackers to perform a denial of service by forcing the
supervisor module to reload.

Modifications:
  ADDREF XF:cisco-catalyst-crash
  CHANGEREF CISCO:Cisco Catalyst Supervisor Remote Reload http://www.cisco.com/warp/public/770/cat7161-pub.shtml

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-catalyst-crash
 Frech> CISCO reference should be
 Frech> http://www.cisco.com/warp/public/770/cat7161-pub.shtml


=================================
Candidate: CAN-1999-0445
Published:
Final-Decision:
Interim-Decision: 19990712
Modified: 19990712-01
Announced: 19990617
Assigned: 19990607
Category: SF
Reference: CISCO:Cisco IOS(R) Software Input Access List Leakage with NAT
Reference: XF:cisco-natacl-leakage

In Cisco routers under some versions of IOS 12.0 running NAT, some
packets may not be filtered by input access list filters.

Modifications:
  ADDREF XF:cisco-natacl-leakage
  CHANGEREF CISCO:Cisco IOS(R) Software Input Access List Leakage with NAT http://www.cisco.com/warp/public/770/iosnatacl-pub.shtml

VOTES:
   ACCEPT(2) Northcutt, Hill
   MODIFY(1) Frech

COMMENTS:
 Frech> Reference: XF:cisco-natacl-leakage
 Frech> CISCO reference should be
 Frech> http://www.cisco.com/warp/public/770/iosnatacl-pub.shtml

Page Last Updated or Reviewed: May 22, 2007