ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] Multiple Vulnerabilitiesin Cisco IOS While Processing SSL Packets



> -----Original Message-----
> From: full-disclosure-bounces@xxxxxxxxxxxxxxxxx 
> [mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxxx] On Behalf 
> Of Cisco Systems Product Security Incident Response Team
> Sent: Tuesday, May 22, 2007 7:07 PM
> To: full-disclosure@xxxxxxxxxxxxxxxxx
> Cc: psirt@xxxxxxxxx
> Subject: [Full-disclosure] Cisco Security Advisory: Multiple 
> Vulnerabilitiesin Cisco IOS While Processing SSL Packets
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> Cisco Security Advisory: 
> Multiple Vulnerabilities in Cisco IOS While Processing SSL Packets
> 
> Advisory ID: cisco-sa-20070522-SSL
> 
> http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml
> 
> Revision 1.0
> 
> For Public Release 2007 May 22 1300 UTC (GMT)
> 
> - 
> --------------------------------------------------------------
> -----------------
> 
> Summary
> =======
> 
> Cisco IOS device may crash while processing malformed Secure 
> Sockets Layer
> (SSL) packets. In order to trigger these vulnerabilities, a 
> malicious client
> must send malformed packets during the SSL protocol exchange with the
> vulnerable device.
> 
> Successful repeated exploitation of any of these 
> vulnerabilities may lead to a
> sustained Denial-of-Service (DoS); however, vulnerabilities 
> are not known to
> compromise either the confidentiality or integrity of the 
> data or the device.
> These vulnerabilities are not believed to allow an attacker 
> will not be able to
> decrypt any previusly encrypted information.
> 
> Cisco IOS is affected by the following vulnerabilities:
> 
>   * Processing ClientHello messages, documented as Cisco bug 
> ID CSCsb12598 
>   * Processing ChangeCipherSpec messages, documented as Cisco 
> bug ID CSCsb40304
>   * Processing Finished messages, documented as Cisco bug ID 
> CSCsd92405 
> 
> Cisco has made free software available to address these 
> vulnerabilities for
> affected customers. There are workarounds available to 
> mitigate the effects of
> these vulnerabilities.
> 
> This advisory is posted at 
> http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml
> 
> Note: Another related advisory has been posted with this 
> advisory. This
> additional advisory also describes a vulnerability related to 
> cryptography that
> affects Cisco IOS. This related advisory is available at the 
> following link:
> http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml
> 
> A combined software table for Cisco IOS is available to aid 
> customers in
> choosing a software releases that fixes all security 
> vulnerabilities published
> as of May 22, 2007. This software table is available at the 
> following link:
> http://www.cisco.com/warp/public/707/cisco-sa-20070522-cry-bun
> dle.shtml.
> 
> Affected Products
> =================
> 
> Vulnerable Products
> +------------------
> 
> These vulnerabilities affect all Cisco devices running Cisco 
> IOS software
> configured to use the SSL protocol. The following application 
> layer protocols
> in Cisco IOS use SSL:
> 
>   * Hyper Text Transfer Protocol over SSL (HTTPS). This is 
> the most commonly
>     used protocol that employs SSL.
>   * Cisco Network Security (CNS) Agent with SSL support
>   * Firewall Support of HTTPS Authentication Proxy
>   * Cisco IOS Clientless SSL VPN (WebVPN) support
> 
> Other protocols that use encryption to provide security but 
> do not use SSL are
> not affected by these vulnerabilities. Specifically, IPSec 
> and Secure Shell
> (SSH) are not affected.
> 
> To determine the software running on a Cisco IOS product, log 
> in to the device
> and issue the show version command to display the system 
> banner. Cisco IOS
> software will identify itself as "Internetwork Operating 
> System Software" or
> simply "IOS." On the next line of output, the image name will 
> be displayed
> between parentheses, followed by "Version" and the Cisco IOS 
> release name.
> Other Cisco devices will not have the show version command, 
> or will give
> different output.
> 
> Only Cisco IOS images that contain the Crypto Feature Set are 
> vulnerable.
> Customers who are not running an IOS image with crypto 
> support are not exposed
> to this vulnerability.
> 
> Cisco IOS feature set naming indicates that IOS images with 
> crypto support have
> 'K8' or 'K9' in the feature designator field.
> 
> The following example shows output from a device running an 
> IOS image with
> crypto support:
> 
>     Router>show version
>     Cisco IOS Software, 7200 Software (C7200-IK9S-M), Version 
> 12.3(14)T1, RELEASE SOFTWARE (fc1)
>     Technical Support: http://www.cisco.com/techsupport
>     Copyright (c) 1986-2005 by Cisco Systems, Inc.
>     Compiled Thu 31-Mar-05 08:04 by yiyan
> 
> 
> Since the feature set designator (IK9S) contains 'K9', it can 
> be determine that
> this feature set contains crypto support.
> 
> Additional information about Cisco IOS release naming is 
> available at the
> following link: 
> http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/product
> s_white_paper09186a008018305e.shtml.
> 
> The following text describes how to recognize if any of the 
> affected services
> are enabled on a device.
> 
> Hyper Text Transfer Protocol Over SSL (HTTPS)
> +--------------------------------------------
> 
> To determine if a device has HTTPS enabled, enter the command 
> "show run | include ip http". The following example shows output from 
> of a device that has HTTPS enabled:
> 
>     Router#show run | include secure-server
>     ip http secure-server
> 
> 
> The following example shows output from a device that does 
> not have HTTPS
> enabled:
> 
>     Router#show run | include secure-server
>     no ip http secure-server
> 
> 
> CNS Agent With SSL Support
> +-------------------------
> 
> CNS Agent with SSL support can only be enabled on devices 
> running a Cisco IOS
> image that supports encryption. The following example shows 
> output from a
> device that has CNS Agent configured to support SSL:
> 
>     Router#show run | include cns config initial
>     cns config initial 10.1.1.1 encrypt no-persist
> 
> 
> If the output does not contain the encrypt keyword the CNS 
> Agent is not
> vulnerable.
> 
> Firewall Support of HTTPS Authentication Proxy
> +---------------------------------------------
> 
> To determine if a device has authentication proxy for HTTPS 
> enabled, enter the
> command "show ip auth-proxy configuration". The following 
> example shows output
> from a device that has authentication proxy for HTTPS enabled:
> 
>     Router#show ip auth-proxy configuration
>     Authentication cache time is 60 minutes
>     Authentication Proxy Rule Configuration
>     Auth-proxy name my_pxy
>     http list not specified auth-cache-time 1 minutes
> 
> 
> If the command does not produce any output, authentication 
> proxy for HTTPS is
> not enabled.
> 
> Cisco IOS Clientless SSL VPN (WebVPN) Enhanced Support
> +-----------------------------------------------------
> 
> To determine if a device has Cisco IOS Clientless SSL VPN 
> (WebVPN) enhanced
> support enabled, enter the command "show webvpn gateway". The 
> following 
> example shows output from a device that has Cisco IOS 
> Clientless SSL VPN 
> (WebVPN) enhanced support enabled:
> 
>     Router#show webvpn gateway
> 
>     Gateway Name                       Admin  Operation
>     ------------                       -----  ---------
>     web-server                         up     up
> 
> 
> If the command does not produces any output, Cisco IOS 
> Clientless SSL VPN
> (WebVPN) enhanced support is not enabled.
> 
> Products Confirmed Not Vulnerable
> +--------------------------------
> 
> No other Cisco products are currently known to be affected by these
> vulnerabilities.
> 
> Details
> =======
> 
> SSL is a protocol designed to provide a secure connection 
> between two hosts.
> The SSL Protocol is described in RFC4346. While not necessary for the
> understanding of this advisory, users are encouraged to 
> consult the section
> "7.3 handshake Protocol Overview" in RFC4346 as well as 
> Figure 1 in the same
> section. The text of the RFC4346 is available at the following link: 
> http://tools.ietf.org/html/rfc4346#section-7.3.
> 
> An attacker can trigger these vulnerabilities after establishing a TCP
> connection, but prior to the exchange of authentication 
> credentials, such as
> username/password or certificate. The requirement of the 
> complete TCP 3-way
> handshake reduces the probability that these vulnerabilities 
> will be exploited
> through the use of spoofed IP addresses.
> 
> An attacker intercepting traffic between two affected devices 
> cannot exploit
> these vulnerabilities if the SSL session is already 
> established because SSL
> protects against such injection. However, such an attack 
> could abnormally
> terminate an existing session, via a TCP RST, for example. 
> The attacker could
> then wait for a new SSL session to be established and inject 
> malicious packets
> at the beginning of the new SSL session, thus triggering the 
> vulnerability.
> 
> Processing ClientHello Messages May Cause Crash
> +----------------------------------------------
> 
> A vulnerable device may crash when processing a malformed 
> ClientHello message.
> The ClientHello message is the first to be sent when a client 
> connects to a
> server. It can also be sent after the SSL session is 
> established; in such
> cases, the message is sent within the encrypted tunnel.
> 
> This vulnerability is documented as Cisco bug ID CSCsb12598 
> 
> Processing ChangeCipherSpec Messages May Cause Crash
> +---------------------------------------------------
> 
> A vulnerable device may crash when processing a malformed 
> ChangeCipherSpec
> message. The ChangeCipherSpec message can only be sent after 
> the ClientHello
> and ServerHello messages are exchanged. In most cases, the 
> ChangeCipherSpec
> message is sent within the encrypted tunnel.
> 
> This vulnerability is documented as Cisco bug ID CSCsb40304 
> 
> Processing Finished Messages May Cause Crash
> +-------------------------------------------
> 
> A vulnerable device may crash when processing a malformed 
> Finished message.
> This message can only be sent as a part of a SSL handshake, 
> but not as the
> first message. The Finished message is always sent within the 
> encrypted tunnel.
> 
> This vulnerability is documented as Cisco bug ID CSCsd92405
> 
> Vulnerability Scoring Details
> +----------------------------
> 
> Cisco is providing scores for the vulnerabilities in this 
> advisory based on the
> Common Vulnerability Scoring System (CVSS).
> 
> Cisco will provide a base and temporal score. Customers can 
> then compute
> environmental scores to assist in determining the impact of 
> the vulnerability
> in individual networks.
> 
> Cisco PSIRT will set the bias in all cases to normal. 
> Customers are encouraged
> to apply the bias parameter when determining the 
> environmental impact of a
> particular vulnerability.
> 
> CVSS is a standards based scoring method that conveys 
> vulnerability severity
> and helps determine urgency and priority of response.
> 
> Cisco has provided an FAQ to answer additional questions 
> regarding CVSS at
> http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html.
> 
> Cisco has also provided a CVSS calculator to help compute
> the environmental impact for individual networks at
> http://intellishield.cisco.com/security/alertmanager/cvss.
> 
> Cisco Bug IDs:
> 
> CSCsb12598 - Processing ClientHello messages
> 
> CVSS Base Score: 3.3
>     Access Vector: Remote
>     Access Complexity: Low
>     Authentication: Not Required
>     Confidentiality Impact: None
>     Integrity Impact: None
>     Availability Impact: Complete
>     Impact Bias: Normal
> 
> CVSS Temporal Score: 2.7
>     Exploitability: Functional
>     Remediation Level: Official Fix
>     Report Confidence: Confirmed
> 
> CSCsb40304 - Processing ChangeCipherSpec messages
> 
> CVSS Base Score: 3.3
>     Access Vector: Remote
>     Access Complexity: Low
>     Authentication: Not Required
>     Confidentiality Impact: None
>     Integrity Impact: None
>     Availability Impact: Complete
>     Impact Bias: Normal
> 
> CVSS Temporal Score: 2.7
>     Exploitability: Functional
>     Remediation Level: Official Fix
>     Report Confidence: Confirmed
> 
> 
> CSCsd92405 - Processing Finished messages
> 
> CVSS Base Score: 3.3
>     Access Vector: Remote
>     Access Complexity: Low
>     Authentication: Not Required
>     Confidentiality Impact: None
>     Integrity Impact: None
>     Availability Impact: Complete
>     Impact Bias: Normal
> 
> CVSS Temporal Score: 2.7
>     Exploitability: Functional
>     Remediation Level: Official Fix
>     Report Confidence: Confirmed
> 
> 
> Impact
> ======
> 
> Successful exploitation of any vulnerability listed in this 
> advisory may result
> in the crash of the affected device. Repeated exploitation 
> can result in a
> sustained DoS condition.
> 
> Software Versions and Fixes
> ===========================
> 
> When considering software upgrades, also consult 
> http://www.cisco.com/go/psirt
> and any subsequent advisories to determine exposure and a 
> complete upgrade
> solution.
> 
> In all cases, customers should exercise caution to be certain 
> the devices to be
> upgraded contain sufficient memory and that current hardware 
> and software
> configurations will continue to be supported properly by the 
> new release. If
> the information is not clear, contact the Cisco Technical 
> Assistance Center
> ("TAC") or your contracted maintenance provider for assistance.
> 
> Each row of the Cisco IOS software table (below) describes a 
> release train. If
> a given release train is vulnerable, then the earliest 
> possible releases that
> contain the fix (the "First Fixed Release") and the 
> anticipated date of
> availability for each are listed in the "Rebuild" and 
> "Maintenance" columns. A
> device running a release in the given train that is earlier 
> than the release in
> a specific column (less than the First Fixed Release) is known to be
> vulnerable. The release should be upgraded at least to the 
> indicated release or
> a later version (greater than or equal to the First Fixed 
> Release label).
> 
> For more information on the terms "Rebuild" and 
> "Maintenance," consult the
> following URL: 
> http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/product
> s_white_paper09186a008018305e.shtml
> 
> +-------------------------------------------------------------
> --------+
> |      Major Release      |     Availability of Repaired 
> Releases     |
> |-------------------------+-----------------------------------
> --------|
> | Affected 12.0-Based     | Rebuild                     | 
> Maintenance |
> | Release                 |                             |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.0T                   | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0WC                  | 12.0(5)WC17                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XE                  | Vulnerable; migrate to 12.1(26)E8 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XH                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XI                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XK                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XL                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XN                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XQ                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XR                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.0XV                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | Affected 12.1-Based     | Rebuild                     | 
> Maintenance |
> | Release                 |                             |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1                    | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1AY                  | Vulnerable; migrate to 
> 12.1(22)EA9 or     |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1CX                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> |                         | 12.1(26)E8                  |     
>         |
> | 12.1E                   
> |-----------------------------+-------------|
> |                         | 12.1(27b)E2; available      |     
>         |
> |                         | 25-June-07                  |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.1EA                  | 12.1(22)EA9                 |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.1EB                  | 12.1(26)EB2; available      |     
>         |
> |                         | 30-July-07                  |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1EC                  | Vulnerable; migrate to 12.3(21)BC 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1EW                  | Vulnerable; migrate to 
> 12.2(25)EWA9 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1EX                  | Vulnerable; migrate to 12.1(26)E8 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1EY                  | Vulnerable; migrate to 12.1(26)E8 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1T                   | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XC                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XD                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XF                  | Vulnerable; migrate 12.3(22) or 
> later     |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XG                  | Vulnerable; migrate 12.3(22) or 
> later     |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XH                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XI                  | Vulnerable; migrate to 12.2(46) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XJ                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XL                  | 12.1(3a)XL2                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XM                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XP                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XQ                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XT                  | Vulnerable; migrate to12.3(22) or 
> later   |
> |-------------------------+-----------------------------------
> --------|
> | 12.1XU                  | 12.1(5)XU2                  |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YB                  | Vulnerable; migrate to12.3(22) or 
> later   |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YC                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YD                  | Vulnerable; migrate to12.3(22) or 
> later   |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YE                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YF                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.1YI                  | Vulnerable; migrate to12.3(22) or 
> later   |
> |-------------------------+-----------------------------------
> --------|
> | Affected 12.2-Based     | Rebuild                     | 
> Maintenance |
> | Release                 |                             |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.2                    |                             | 
> 12.2(46)    |
> |-------------------------+-----------------------------------
> --------|
> | 12.2B                   | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2BC                  | Vulnerable; migrate to 
> 12.3(17b)BC5 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2BW                  | Vulnerable; migrate 12.3(22) or 
> later     |
> |-------------------------+-----------------------------------
> --------|
> | 12.2BY                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2BZ                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2CX                  | Vulnerable; migrate to 12.3(21)BC 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2CY                  | Vulnerable; migrate to 12.3(21)BC 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2CZ                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2DD                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2EW                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2EWA                 | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2EX                  | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2EY                  | Vulnerable; migrate to 12.2(35)SE 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2EZ                  | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2FX                  | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2FY                  | Vulnerable; migrate to 
> 12.2(25)SEG2 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2FZ                  | Vulnerable; migrate to 12.2(35)SE 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2IXA                 | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2IXB                 | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2JA                  | Vulnerable; migrate to 12.3(11)JA 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2JK                  | Vulnerable; migrate to 12.4(4)T 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2S                   | Vulnerable; migrate to 
> 12.2(31)SB2 or     |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SB                  | 12.2(31)SB2                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SBC                 | Vulnerable; migrate to 
> 12.2(31)SB2 or     |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SE                  |                             | 
> 12.2(35)SE  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEA                 | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEB                 | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEC                 | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SED                 | Vulnerable; migrate to 
> 12.2(25)SEE3 or    |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEE                 | 12.2(25)SEE3                |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEF                 | Vulnerable; migrate to 12.2(35)SE 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SEG                 | 12.2(25)SEG2                |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SG                  | 12.2(37)SG                        
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SGA                 | 12.2(31)SGA1                |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.2SRA                 | 12.2(33)SRA2                |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SU                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> |                         | 12.2(28)SV2                 |     
>         |
> | 12.2SV                  
> |-----------------------------+-------------|
> |                         | 12.2(29)SV3                 |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.2SW                  | 12.2(25)SW8                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SX                  | Vulnerable; migrate to 
> 12.2(18)SXE6b or   |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SXA                 | Vulnerable; migrate to 
> 12.2(18)SXE6b or   |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SXB                 | Vulnerable; migrate to 
> 12.2(18)SXE6b or   |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SXD                 | Vulnerable; migrate to 
> 12.2(18)SXE6b      |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SXE                 | 12.2(18)SXE6b               |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.2SXF                 | 12.2(18)SXF                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2SY                  | Vulnerable; migrate to 
> 12.2(18)SXE6b or   |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2T                   | Vulnerable; migrate 12.3(22) or 
> later     |
> |-------------------------+-----------------------------------
> --------|
> | 12.2TPC                 | 12.2(8)TPC10b               |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XA                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XB                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XD                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XE                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XF                  | Vulnerable; migrate to 12.3(21)BC 
> or      |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XG                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XH                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XI                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XJ                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XK                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XL                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XM                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XN                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XQ                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XR                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XS                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XT                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XU                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XV                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2XW                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YA                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YB                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YC                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YD                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YE                  | Vulnerable; migrate to 
> 12.2(31)SB2 or     |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YF                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YJ                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YL                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YM                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YN                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YQ                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YR                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YU                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YV                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YW                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YX                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YY                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2YZ                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZA                  | Vulnerable; migrate to 
> 12.2(18)SXE6b or   |
> |                         | later                             
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZB                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZD                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZE                  | Vulnerable; migrate to 12.3(22) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZF                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZH                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZJ                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZL                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZN                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZU                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZV                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZW                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.2ZX                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | Affected 12.3-Based     | Rebuild                     | 
> Maintenance |
> | Release                 |                             |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.3                    |                             | 
> 12.3(22)    |
> |-------------------------+-----------------------------------
> --------|
> | 12.3B                   | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3BC                  | 12.3(17b)BC5                | 
> 12.3(21)BC  |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.3JA                  |                             | 
> 12.3(11)JA  |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.3JEA                 |                             | 
> 12.3(8)JEA  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3JK                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3JX                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3T                   | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3TPC                 | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XA                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XB                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XC                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XD                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XE                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XF                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XG                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XH                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XI                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XJ                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XK                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XQ                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XR                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XS                  | Vulnerable; migrate to 12.4(10) 
> or later  |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XU                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XW                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3XX                  | 12.3(8)XX2d                 |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YA                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YD                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YF                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YG                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YH                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YI                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YK                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YQ                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YS                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YT                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YU                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YX                  | Vulnerable; migrate to 12.4(11)T 
> or later |
> |-------------------------+-----------------------------------
> --------|
> | 12.3YZ                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | Affected 12.4-Based     | Rebuild                     | 
> Maintenance |
> | Release                 |                             |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.4                    |                             | 
> 12.4(10)    |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.4T                   |                             | 
> 12.4(11)T   |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XA                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XB                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XC                  | 12.4(4)XC6                  |     
>         |
> |-------------------------+-----------------------------+-----
> --------|
> | 12.4XD                  | 12.4(4)XD5                  |     
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XE                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XP                  | Vulnerable; contact TAC           
>         |
> |-------------------------+-----------------------------------
> --------|
> | 12.4XT                  | Vulnerable; contact TAC           
>         |
> +-------------------------------------------------------------
> --------+
> 
> Workarounds
> ===========
> 
> The only way to prevent a device from being susceptible to the listed
> vulnerabilities is to disable the affected service(s). 
> However, if regular
> maintenance and operation of the device relies on these 
> services, there is no
> workaround.
> 
> It is possible to mitigate these vulnerabilities by 
> preventing unauthorized
> hosts from accessing affected devices. Additional mitigations 
> that can be
> deployed on Cisco devices within the network are available in 
> the Cisco Applied
> Intelligence companion document for this advisory. This 
> companion document is
> available at the following link: 
> http://www.cisco.com/warp/public/707/cisco-air-20070522-SSL.shtml
> 
> Control Plane Policing (CoPP)
> +----------------------------
> 
> Control Plane Policing: IOS software versions that support 
> Control Plane
> Policing (CoPP) can be configured to help protect the device 
> from attacks that
> target the management and control planes. CoPP is available 
> in Cisco IOS
> release trains 12.0S, 12.2SX, 12.2S, 12.3T, 12.4, and 12.4T.
> 
> In the following CoPP example, the ACL entries that match the 
> exploit packets
> with the permit action will be discarded by the policy-map 
> drop function, while
> packets that match a "deny" action (not shown) are not affected by the
> policy-map drop function:
> 
>     ! Include deny statements up front for any 
> protocols/ports/IP addresses that
>     !-- should not be impacted by CoPP
> 
>     ! Include permit statements for the protocols/ports that 
> will be governed by CoPP
>     access-list 100 permit tcp any any eq 443
> 
>     !-- Permit (Police or Drop)/Deny (Allow) all other Layer3 
> and Layer4
>     !-- traffic in accordance with existing security policies and
>     !-- configurations for traffic that is authorized to be sent
>     !-- to infrastructure devices.
>     !
>     !-- Create a Class-Map for traffic to be policed by
>     !-- the CoPP feature.
>     !
>     class-map match-all drop-SSL-class
>      match access-group 100
> 
>     !
>     !-- Create a Policy-Map that will be applied to the
>     !-- Control-Plane of the device.
>     !
>     policy-map drop-SSL-policy
>      class drop-SSL-class
>        drop
> 
>     !-- Apply the Policy-Map to the Control-Plane of the
>     !-- device.
>     !
>     control-plane
>      service-policy input drop-SSL-policy
> 
> 
> Please note that in the 12.0S, 12.2S, and 12.2SX Cisco IOS trains, the
> policy-map syntax is different, as demonstrated by the following:
> 
>     policy-map drop-SSL-policy
>      class drop-SSL-class
>      police 32000 1500 1500 conform-action drop exceed-action drop
> 
> 
> NOTE: In the above CoPP example, the ACL entries with the 
> "permit" action that
> match the exploit packets result in the discarding of those 
> packets by the
> policy-map drop function, while packets that match the "deny" 
> action are not
> affected by the policy-map drop function.
> 
> Additional information on the configuration and use of the 
> CoPP feature 
> is available at the following links: 
> http://www.cisco.com/en/US/products/ps6642/products_white_pape
> r0900aecd804fa16a.shtml
> and 
> http://www.cisco.com/en/US/products/sw/iosswrel/ps1838/product
> s_feature_guide09186a008052446b.html
> 
> Access Control List (ACL)
> +------------------------
> 
> An Access Control List (ACL) can be used to help mitigate 
> attacks targeting
> these vulnerabilities. ACLs can specify that only packets 
> from legitimate
> sources are permitted to reach a device, and all others are 
> to be dropped. The
> following example shows how to allow legitimate SSL sessions 
> from trusted
> sources and deny all other SSL sessions:
> 
>     access-list 101 permit tcp host 
> <legitimate_host_IP_address> host <router_IP_address> port 443
>     access-list 101 deny tcp any any port 443
> 
> 
> Obtaining Fixed Software
> ========================
> 
> Cisco has made free software available to address this 
> vulnerability for
> affected customers. Prior to deploying software, customers 
> should consult their
> maintenance provider or check the software for feature set 
> compatibility and
> known issues specific to their environment.
> 
> Customers may only install and expect support for the feature 
> sets they have
> purchased. By installing, downloading, accessing or otherwise 
> using such
> software upgrades, customers agree to be bound by the terms 
> of Cisco's software
> license terms found at 
> http://www.cisco.com/public/sw-license-agreement.html,
> or as otherwise set forth at Cisco.com Downloads at
> http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
> 
> Do not contact either "psirt@xxxxxxxxx" or 
> "security-alert@xxxxxxxxx" for
> software upgrades.
> 
> Customers with Service Contracts
> +-------------------------------
> 
> Customers with contracts should obtain upgraded software through their
> regular update channels. For most customers, this means that upgrades
> should be obtained through the Software Center on Cisco's worldwide
> website at http://www.cisco.com.
> 
> Customers using Third-party Support Organizations
> +------------------------------------------------
> 
> Customers whose Cisco products are provided or maintained 
> through prior or
> existing agreement with third-party support organizations 
> such as Cisco
> Partners, authorized resellers, or service providers should 
> contact that
> support organization for guidance and assistance with the 
> appropriate course of
> action in regards to this advisory.
> 
> The effectiveness of any workaround or fix is dependent on 
> specific customer
> situations such as product mix, network topology, traffic 
> behavior, and
> organizational mission. Due to the variety of affected 
> products and releases,
> customers should consult with their service provider or 
> support organization to
> ensure any applied workaround or fix is the most appropriate 
> for use in the
> intended network before it is deployed.
> 
> Customers without Service Contracts
> +----------------------------------
> 
> Customers who purchase direct from Cisco but who do not hold 
> a Cisco service
> contract and customers who purchase through third-party 
> vendors but are
> unsuccessful at obtaining fixed software through their point 
> of sale should get
> their upgrades by contacting the Cisco Technical Assistance 
> Center (TAC). TAC
> contacts are as follows.
> 
>   * +1 800 553 2447 (toll free from within North America)
>   * +1 408 526 7209 (toll call from anywhere in the world)
>   * e-mail: tac@xxxxxxxxx
> 
> Have your product serial number available and give the URL of 
> this notice as
> evidence of your entitlement to a free upgrade. Free upgrades 
> for non-contract
> customers must be requested through the TAC.
> 
> Refer to 
> http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for
> additional TAC contact information, including special 
> localized telephone
> numbers and instructions and e-mail addresses for use in 
> various languages.
> 
> Exploitation and Public Announcements
> =====================================
> 
> The Cisco PSIRT is not aware of any public announcements or 
> malicious use of
> the vulnerabilities described in this Advisory.
> 
> These vulnerabilities were discovered by Cisco during 
> internal testing.
> 
> Status of This Notice: FINAL
> ============================
> 
> THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT 
> IMPLY ANY KIND OF
> GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF 
> MERCHANTABILITY OR FITNESS
> FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE 
> DOCUMENT OR MATERIALS
> LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES 
> THE RIGHT TO
> CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
> 
> A stand-alone copy or Paraphrase of the text of this document 
> that omits the
> distribution URL in the following section is an uncontrolled 
> copy, and may lack
> important information or contain factual errors.
> 
> Distribution
> ============
> 
> This advisory is posted on Cisco's worldwide website at 
> http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml.
> 
> In addition to worldwide web posting, a text version of this notice is
> clear-signed with the Cisco PSIRT PGP key and is posted to 
> the following e-mail
> and Usenet news recipients.
> 
>   * cust-security-announce@xxxxxxxxx
>   * first-teams@xxxxxxxxx
>   * bugtraq@xxxxxxxxxxxxxxxxx
>   * vulnwatch@xxxxxxxxxxxxx
>   * cisco@xxxxxxxxxxxxxxxxx
>   * cisco-nsp@xxxxxxxxxxxxxxx
>   * full-disclosure@xxxxxxxxxxxxxxxxx
>   * comp.dcom.sys.cisco@xxxxxxxxxxxxxxxxxx
> 
> Future updates of this advisory, if any, will be placed on 
> Cisco's worldwide
> website, but may or may not be actively announced on mailing lists or
> newsgroups. Users concerned about this problem are encouraged 
> to check the
> above URL for any updates.
> 
> Revision History
> ================
> 
> +-------------------------------------------------------------
> --------+
> | Revision 1.0     | 2007-May-22     | Initial public 
> release.        |
> +-------------------------------------------------------------
> --------+
> 
> Cisco Security Procedures
> =========================
> 
> Complete information on reporting security vulnerabilities in 
> Cisco products,
> obtaining assistance with security incidents, and registering 
> to receive
> security information from Cisco, is available on Cisco's 
> worldwide website at
> http://www.cisco.com/en/US/products/products_security_vulnerab
> ility_policy.html
> This includes instructions for press inquiries regarding 
> Cisco security
> notices. All Cisco security advisories are available at 
> http://www.cisco.com/go/psirt.
> 
> - 
> --------------------------------------------------------------
> -----------------
> All contents are Copyright 2006-2007 Cisco Systems, Inc. All 
> rights reserved.
> - 
> --------------------------------------------------------------
> -----------------
> 
> Updated: May 22, 2007                                        
> Document ID: 91888
> 
> - 
> --------------------------------------------------------------
> -----------------
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2.2 (GNU/Linux)
> 
> iD8DBQFGUv7w8NUAbBmDaxQRAt2eAJ9HfpjbjdXCbden9C3cegJgptT6fgCgscZ4
> Ce+S5/oA5GrNfmtT4Taqm20=
> =IRzP
> -----END PGP SIGNATURE-----
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 



 




Copyright © Lexa Software, 1996-2009.