
====================================================================

                                  CERT-Renater

                      Note d'Information No. 2016/VULN337
_____________________________________________________________________

DATE                : 28/09/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco IOS, Cisco IOS XE.

=====================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aaados
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-esp-nat
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ios-ikev1
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi
____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software AAA Login Denial
of Service Vulnerability

Advisory ID:  cisco-sa-20160928-aaados

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the Authentication, Authorization, and Accounting
(AAA) service for remote Secure Shell Host (SSH) connections to the
device for Cisco IOS and IOS XE Software could allow an
unauthenticated, remote attacker to cause the vulnerable device to
reload.

The vulnerability is due to an error log message when a remote SSH
connection to the device fails AAA authentication. An attacker could
exploit this vulnerability by attempting to authenticate to the
targeted device. An exploit could allow the attacker to cause a denial
of service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There is a workaround that addresses this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aaados

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software DNS Forwarder
Denial of Service Vulnerability

Advisory ID: cisco-sa-20160928-dns

Revision: 1.0

For Public Release: 2016 September 28 16:00 GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the DNS forwarder functionality of Cisco IOS and IOS
XE Software could allow an unauthenticated, remote attacker to cause
the device to reload, corrupt the information present in the device's
local DNS cache, or read part of the process memory.

The vulnerability is due to a flaw in handling crafted DNS response
messages. An attacker could exploit this vulnerability by intercepting
and crafting a DNS response message to a client DNS query that was
forwarded from the affected device to a DNS server. A successful
exploit could cause the device to reload, resulting in a denial of
service (DoS) condition or corruption of the local DNS cache
information.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software NAT Denial of Service
Vulnerability

Advisory ID:  cisco-sa-20160928-esp-nat

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the implementation of Network Address Translation
(NAT) functionality in Cisco IOS XE Software could allow an
unauthenticated, remote attacker to cause an affected device to reload.

The vulnerability is due to improper handling of malformed ICMP packets
by the affected software. An attacker could exploit this vulnerability
by sending crafted ICMP packets that require NAT processing by an
affected device. A successful exploit could allow the attacker to cause
the device to reload, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-esp-nat

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software IP Fragment Reassembly
Denial of Service Vulnerability

Advisory ID:  cisco-sa-20160928-frag

Revision: 1.0

For Public Release: 2016 September 28 16:00 GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the IPv4 fragment reassembly function of Cisco IOS
XE Software could allow an unauthenticated, remote attacker to cause an
affected device to reload.

The vulnerability is due to the corruption of an internal data
structure that occurs when the affected software reassembles an IPv4
packet. An attacker could exploit this vulnerability by sending crafted
IPv4 fragments to an affected device. A successful exploit could allow
the attacker to cause the device to reload, resulting in a denial of
service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software H.323 Message
Validation Denial of Service Vulnerability

Advisory ID:  cisco-sa-20160928-h323

Revison: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the H.323 subsystem of Cisco IOS and IOS XE Software
could allow an unauthenticated, remote attacker to create a denial of
service (DoS) condition on an affected device.

The vulnerability is due to a failure to properly validate certain
fields in an H.323 protocol suite message. When processing the
malicious message, the affected device may attempt to access an invalid
memory region, resulting in a crash. An attacker who can submit an
H.323 packet designed to trigger the vulnerability could cause the
affected device to crash and restart.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Internet Key
Exchange Version 1 Fragmentation Denial of Service Vulnerability

Advisory ID:  cisco-sa-20160928-ios-ikev1

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======
A vulnerability in the Internet Key Exchange version 1 (IKEv1)
fragmentation code of Cisco IOS and IOS XE Software could allow an
unauthenticated, remote attacker to cause an exhaustion of available
memory or a reload of the affected system.

The vulnerability is due to the improper handling of crafted,
fragmented IKEv1 packets. An attacker could exploit this vulnerability
by sending crafted UDP packets to the affected system. An exploit could
allow the attacker to cause a reload of the affected system.

Note: Only traffic directed to the affected system can be used to
exploit this vulnerability. This vulnerability can be triggered by
IPv4 and IPv6 traffic.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ios-ikev1

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software IP Detail Record
Denial of Service Vulnerability

Advisory ID:  cisco-sa-20160928-ipdr

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the IP Detail Record (IPDR) code of Cisco IOS and
IOS XE Software could allow an unauthenticated, remote attacker to
cause an affected system to reload.

The vulnerability is due to improper handling of IPDR packets. An
attacker could exploit this vulnerability by sending crafted IPDR
packets to an affected system. A successful exploit could cause the
device to reload, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:


This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Multicast
Routing Denial of Service Vulnerabilities

Advisory ID:  cisco-sa-20160928-msdp

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

Multiple vulnerabilities in the multicast subsystem of Cisco IOS and
IOS XE Software could allow an unauthenticated, remote attacker to
create a denial of service (DoS) condition. The issues are in IPv4
Multicast Source Discovery Protocol (MSDP) and IPv6 Protocol
Independent Multicast (PIM).

The first vulnerability (Cisco bug ID CSCud36767) is due to
insufficient checking of MSDP Source-Active (SA) messages received from
a configured MSDP peer. An attacker who can send traffic to the IPv4
address of a device could exploit this vulnerability by sending a
packet designed to trigger the issue to the affected device. A
successful exploit could cause the affected device to restart.

The second vulnerability (Cisco bug ID CSCuy16399) is due to
insufficient checking of packets encapsulated in a PIM register
message. An attacker who can send a malformed IPv6 PIM register packet
to a PIM rendezvous point (RP) could exploit the vulnerability. A
successful exploit could cause the affected device to restart.

Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.

____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install
Memory Leak Vulnerability

Advisory ID:  cisco-sa-20160928-smi

Revision: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

The Smart Install client feature in Cisco IOS and IOS XE Software
contains a vulnerability that could allow an unauthenticated, remote
attacker to cause a memory leak and eventual denial of service (DoS)
condition on an affected device.

The vulnerability is due to incorrect handling of image list
parameters. An attacker could exploit this vulnerability by sending
crafted Smart Install packets to TCP port 4786. A successful exploit
could cause a Cisco Catalyst switch to leak memory and eventually
reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability other than
disabling Smart Install functionality on the affected device.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi

This advisory is part of the September 28, 2016, release of the Cisco
IOS and IOS XE Software Security Advisory Bundled Publication, which
includes 10 Cisco Security Advisories that describe 11 vulnerabilities.
All the vulnerabilities have a Security Impact Rating of High. For a
complete list of the advisories and links to them, see Cisco Event
Response: September 2016 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication.
____________________________________________________________________



==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



