-
Three vulnerabilities have been discovered in Cisco SN 5420 Storage Router software releases up to and including 1.1(5). Two of the vulnerabilities can cause a Denial-of-Service attack. The other allows access to the SN 5420 configuration if it has been previously saved on the router.
There is no workaround for these vulnerabilities.
No other Cisco product is vulnerable.
This advisory is available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020109-sn-vulnerabilities.
-
This section provides details on affected products.
Vulnerable Products
Cisco SN 5420 Storage Routers running software release up to and including 1.1(5) are affected by the vulnerabilities. Please note that 1.1(6) version of the software was never released by Cisco.
To determine your software release, type show system at the command prompt.
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
This section provides details about this vulnerability.
-
CSCdv24925 -- It is possible to read stored
configuration files from the Storage Router without any authorization.
-
CSCdu32533 -- By sending a HTTP request with huge
headers, it is possible to crash the Storage Router.
-
CSCdu45417 -- It is possible to halt the Storage
Router by sending a fragmented packet over the Gigabit interface.
-
CSCdv24925 -- It is possible to read stored
configuration files from the Storage Router without any authorization.
-
This section describes workarounds for these vulnerabilities.
-
CSCdv24925 -- It is possible to mitiagte this
vulnerability by blocking access on the network's edge and by using hard to
guess names for saved configuration.
-
CSCdu32533 -- There is no workaround for this
vulnerability.
-
CSCdu45417 -- There is no workaround for this
vulnerability.
-
CSCdv24925 -- It is possible to mitiagte this
vulnerability by blocking access on the network's edge and by using hard to
guess names for saved configuration.
-
All three vulnerabilities are fixed in release 1.1(7) of the software, which is available on CCO. Please note that version 1.1(6) of the software was never released by Cisco.
-
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory.
These vulnerabilities were found internally during product testing.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.