Article Number: 000151666
Article Summary: | A draft IETF document was published and made available describing various attack methods possible against TCP sessions using ICMP. These vulnerabilities are described in “ICMP attacks against TCP”, published by Fernando Gont and available at http://www.ietf.org/internet-drafts/draft-gont-tcpm-icmp-attacks-03.txt. The draft describes three vulnerabilities:
|
1. | Products Affected |
TeraScale RPM E300, E600 and E1200 (LC-RPM-EF3 LC-RPM-EF) |
EtherScale RPM E1200 and E600 (LC-ED-RPM) | EtherScale RPM E300 (LC-EE3-RPM) | |
Blind Reset | Not Vulnerable | Not Vulnerable | Not Vulnerable |
Source Quench | CP Processor TCP Sessions Only1 |
CP Processor TCP Sessions Only1 |
All TCP Sessions2 |
PMTU Discovery | Not Vulnerable | Not Vulnerable | Not Vulnerable |
2. | Workaround |
interface Loopback 0 ip access-group deny_quench in no shutdown ! ip access-list extended deny_quench seq 5 deny icmp any any source-quench seq 10 permit ip any any
interface Loopback 0 ip address 192.168.0.1/32 no shutdown ! interface Loopback 1 ip address 192.168.1.1/32 no shutdown ! interface TenGigabitEthernet 0/0 ip address 172.16.0.1/30 ip access-group deny_quench in no shutdown ! interface TenGigabitEthernet 0/1 ip address 172.16.1.1/30 ip access-group deny_quench in no shutdown ! ip access-list extended deny_quench seq 5 deny icmp any host 172.16.0.1 source-quench seq 10 deny icmp any host 172.16.1.1 source-quench seq 15 deny icmp any host 192.168.0.1 source-quench seq 20 deny icmp any host 192.168.1.1 source-quench seq 25 permit ip any any
3. | Software Fixes |
Vulnerable Release | Fixed Release Fixed | Release Date |
6.2.1.x and earlier | 6.2.1.5 and later | September 2005 |
Vulnerable Release | Fixed Release Fixed | Release Date |
6.5.1.x 7.4.x |
7.5.1.0 | August 21, 2007 |
4. | Status of Advisory |
5. | Advisory Date History and Version |
21 Feb 2021
3
Solution