Cisco Confirms Regex Flaw in IOS 61
gattaca writes "Cisco has announced a confirmation of an unpatched denial of service vulnerability in Cisco IOS. From the NetPro Forum post: 'I have just discovered a regular expression that crashes the router. I suspect the error is because of division by zero. Since I work for the Enterprise, I do not have direct access to TAC. Please somebody report this to Cisco. I have tested it on ranges of routers (2611, 2821, 2851, 7206) and IOSes (12.0-12.4). All routers crashed with some type of BUS ERROR.
Command can be issued in user mode, therefore I think it can be considered as vulnerability to potentially cause DOS.'" Of course, the command has to be entered in user mode, so while potentially a vulnerability, chances are your local IOS-based router won't be DoSed via the bug any time soon.
does it could as denial of service (Score:3, Insightful)
Re: (Score:2)
I can't type early on Saturday mornings.
Re:does it could as denial of service (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
All it needs is someone to use a back reference or a repetitive match (*) in a regexp and the router could reload.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Insightful)
I've worked in the area for a number of years now supporting both Cisco and Linux based network infrastructure, and I can say with some confidence that on a large scale, bugs in various programs which can lead to total loss of service are hardly rare. DoS bugs exist, and while many will just randomly
Re: (Score:2)
This bug affects IOS versions all the way back to 12.0. I've used regular expressions on these IOS's every day for years and years and have NEVER had the device reboot on me. You must have to get really complicated with the expression or be back-referencing very large strings in order to crash a box this way, because I never have, nor has anyone at my company (w
Re: (Score:1)
It's possible that a larger set of staff besides just network engineers have access to different levels of automation. Some of that automation might be able to run commands like this if abused correctly.
Re: (Score:1)
OK more than a little off topic, but maybe interesting in an historical artifact sort of way...
It was 1976 and I was working on an IBM mainframe for the first time, using TSO (Time Sharing Option) to a local service bureau with hundreds of clients. Typing in my commands when dang, TSO went down and the whole system with it. After about 10 or 20 minutes it came back up, and I re-entered my stuff until dang, down it went again, an
Get off the bus (Score:1)
Then don't do that (Score:2, Funny)
Reminds me of:
Patient: "My arm hurts when I do this." <wiggles arm>
Doctor: "Then don't do that."
The solution is obvious: don't use that regex/divide by zero. Duhhhh. Problem solved. Thank you, come again.
Re: (Score:2)
b: When I press here, here, here or here it hurts.
a: Ah, I see. You finger is broken.
A bigger IOS flaw discovered (Score:5, Funny)
The Enterprise (Score:5, Funny)
Yes, Capt. Kirk can be very protective of the TAC.
Re: (Score:3, Interesting)
Even when they don't want to guarantee response times or resolution times, at the very least they could register the problems their customers have discovered.
Re: (Score:1)
A defect in the product is the responsibility of the manufacturer/developer! Improving the product by removing/resolving defects is
Re: (Score:2)
Call Cisco's TAC, give them your serial number, and tell them you've found a security flaw. Record the conversation, editing out any confidential bits. If they won't listen to you, post the MP3 of the call online. See if that gets any attention.
Re: (Score:2)
"In addition to that, the Cisco PSIRT Security Vulnerability Policy is available at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html [cisco.com] - for any customer, with our without a service contract, which might be interested in contacting us.
Thanks,
Dario "
Re: (Score:1)
(And they really hate people logging bugs that have already been fixed.)
RegEx's are incredibly dangerous (Score:3, Informative)
Writing code that can parse for any given syntax is, well, pretty much as difficult as writing a parsing front-end to a compiler.
I.e. it is not trivial and it is fraught with danger.
Any time you allow the user to submit arbitrary, un-screened, un-filtered data, you're just asking for trouble.
Of course, I guess you could argue that the job of a RegEx parser is precisely to do the screening & the filtering for you, but it is not a trivial business, and anyone who approaches the problem as though it were a mere triviality is a fool.
I.e. from the security point of view, the RegEx parser is a firewall [and, in all likelihood, is the only firewall], hence anyone writing a RegEx parser has to assume that the user submitting the input is a blackhat, not a whitehat.
PS: And the problem undergoes manifold [if not infinite] complexification when you're dealing with languages [or "environments"] like HTML, Javascript, and XML, which can re-write themselves on the fly.
Re: (Score:1, Funny)
Looking Glass (Score:1, Insightful)
LGs aren't a problem but public route servers are (Score:3, Informative)
That said, I'm on AT&T's route server right now and I can clearly see that it's been abused by the regex bug:
Re: (Score:1)
Re: (Score:3, Funny)
As it happens, I can divide by zero, but only when I try to figure out the inverse of the percentage of well-spent money from my tax dollars.
Or perhaps, the ratio of posts to informational-posts.
After all, Godwin needs revision - to paraphrase "A Beautiful Mind".
Old news (to everyone but Cisco) (Score:5, Insightful)
To be fair, there IS a story here, which is that Cisco only just acknowledged this officially.
Service Provider types (the operators of routers whose successful attack would actually affect anyone in the real world) have been well aware of this. But as others have pointed out, if you don't trust your admins, and you're not running proper logging and a proper audit trail of admin sessions already, you've got bigger problems than this.
A question (Score:1, Offtopic)
Re: (Score:3, Informative)
Re: (Score:2, Flamebait)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1, Insightful)
Re: (Score:2)
Answer #1: The latter one can be installed and operated by mere mortals, or at least folks reasonably close to such.
Answer #2: The latter operates effectively within the scope of your existing monitoring and management processes while the former does not.
Answer #3: The latter is targeted at and marketed to companies (not individuals) where Answers 1 and 2 are much more important that the initial acquisition cost.
Re: (Score:2, Insightful)
Assuming you only need 100Mbit though (which is fine for lower tiered subnets), Well... there are three systems hooked up to my WRT54GL, and it's running at about 10% of ca
Re:A question (Score:4, Insightful)
At pretty much anything above the branch office level, however, there's a huge difference. The two biggies are the backplane, and the ability to support proper linecards with offload routing processors. When you have a fat high-end device in your network core with 8 16-way OC3 linecards, there's just no way the standard PC architecture can keep up. The PC architecture jus isn't designed to shift massive amounts of IO, twiddle bits on a zillion and one packets per second, then route them out a different interface.
If your cable runs look like this [tmk.com] then you are not going to be using PC hardware, believe me.
Juniper are a good alternative to Cisco, though. There is now finally some competition.
Re: (Score:1)
Check that out, that's what your money buys you from Cisco.
Boston's Beth Israel Hospital went down due to a spanning tree protocol loop (caused by a network infrastructure that was improperly patched together). Cisco had a team on-site in under four hours working on the problem. They did a massive re-structuring of the major parts of the network in less than three days. They flew in two of their massive multi-switches to get the network working.
It's a cisco p
Re: (Score:2)
And let the lesson for this be never to let spanning tree have to be used in the first place
Design layer 2 networks such that ports are always in a forwarding state, i.e. a loop free physical topology.
Re: (Score:2)
But spanning tree can still be usefull for when someone creates a loop by accident.
But then again, it may stay undetected.
So it depends on what your prefereences are.
not /0 error (Score:2)
Re: (Score:1)
Crash a router using CLI access? (Score:1, Informative)
The risk is almost the same as "reload" or the even more fun undocumented "test crash" commands.
Granted I do not think this vulnerability requires "enable" access, which does increase the risk. However, nobody should have any CLI to a router that you do not trust.
I guess I'm a security researcher then (Score:3, Insightful)
User mode (Score:2)
Re: (Score:2)
Your problem is not in the router. (Score:2)