发布日期:2008-09-24 更新日期:2008-09-26 受影响系统: cisco ios 12.3 cisco ios 12.2 cisco ubr10012 描述: -------------------------------------------------------------------------------- bugtraq id: 31355 cve(can) id: cve-2008-3807 cisco
发布日期:2008-09-24
更新日期:2008-09-26
受影响系统:
cisco ios 12.3
cisco ios 12.2
cisco ubr10012
描述:
--------------------------------------------------------------------------------
bugtraq id: 31355
cve(can) id: cve-2008-3807
cisco ubr10012是一款大型的高端宽带路由器。
如果配置了线卡冗余的话,cisco ubr10012系列设备需要与rf交换机通讯,这种通讯是基于snmp的。如果cisco ubr10012系列设备上启用了线卡冗余,还会以拥有读写权限的默认团体字符串private自动启用snmp。由于对这个团体字符串没有访问限制,攻击者可以利用这个团体字符串完全控制设备。
链接:http://secunia.com/advisories/31990/
http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml
*>
建议:
--------------------------------------------------------------------------------
临时解决方法:
* 更改snmp团体字符串并限制访问。
以下配置示例为操作人员提供有关更改团体字符串并使用acl添加snmp访问控制限制的信息。
access-list 90 permit host
access-list 90 permit host
access-list 90 permit host
access-list 90 deny any
redundancy
linecard-group 1 cable
rf-switch snmp-community
snmp-server community rw 90
在cisco ubr10012设备上更改snmp团体时,还必须在rf交换机上通过以下命令更改:
set snmp community
如果cisco ios版本不支持更改团体字符串,可对默认的团体字符串应用访问控制限制。以下配置示例为操作人员提供有关对默认团体字符串应用访问控制限制的信息。
access-list 90 permit host
access-list 90 permit host
access-list 90 permit host
access-list 90 deny any
snmp-server community private rw 90
* 在网络边界使用基础架构acl(iacl)
!-- permit snmp (udp port 161) packets from trusted hosts
!-- destined to infrastructure addresses.
!
access-list 150 permit udp trusted_hosts mask infrastructure_addresses mask eq 161
!
!-- deny snmp (udp port 161) packets from all other sources
!-- destined to infrastructure addresses.
!
access-list 150 deny udp any infrastructure_addresses mask eq 161
!
!-- permit/deny all other layer 3 and layer 4 traffic in
!-- accordance with existing security policies and
!-- configurations.
!
!-- permit all other traffic to transit the device.
!
access-list 150 permit ip any any
!
!-- apply iacl to interfaces in the ingress direction.
!
interface gigabitethernet0/0
ip access-group 150 in
!
厂商补丁:
cisco
-----
cisco已经为此发布了一个安全公告(cisco-sa-20080924-ubr)以及相应补丁:
cisco-sa-20080924-ubr:cisco ubr10012 series devices snmp vulnerability
链接:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml