Nortel VPN Router Malformed Packet DoS Vulnerability
Nortel VPN Router Malformed Packet DoS Vulnerability
Summary:
NTA Monitor have discovered a denial of service (DoS) vulnerability in the
Nortel VPN Router products (which were previously known as Nortel
Contivity) while performing a VPN security test for a customer.
We believe that this is a serious vulnerability, because a single malformed
IKE packet causes the VPN router to crash. Also it is not normally
possible to prevent the malformed packet from reaching the router.
Vulnerability Details:
The vulnerability is triggered by sending a single IPsec IKE packet with a
malformed ISAKMP header. On receipt of this malformed packet, the VPN
router will crash immediately. The crash occurs every time such a
malformed packet is sent.
Sometimes the affected VPN router will automatically reboot (which takes
about five minutes), but sometimes it will stay down indefinitely and
require manual intervention to restart it. In tests, the VPN router
automatically rebooted around 80% of the time, and needed to be manually
reset on the remaining 20%.
The VPN router does not log the malformed packet, even if the logging level
is turned up to maximum. This is probably because the packet causes the
router to crash before it has a chance to log it.
It is not normally possible to block public inbound access to the IKE
service on the VPN router, because it is required for remote access IPsec
operation. As IKE uses the UDP transport protocol, the attacker may forge
the packet's source IP address to avoid identification, or to prevent the
victim from blocking the traffic with ingress filtering. In addition,
current IDS/IPS systems will probably not be able to detect the attack,
because the malformed packet looks very similar to a normal IKE packet.
It is possible for attackers to detect and fingerprint Nortel VPN routers
using the IKE fingerprinting techniques that we have previously published
in VPN security white papers. Therefore users should not assume that their
VPN router is invisible just because it's not published in the DNS and is
not running any TCP services.
We are not planning to release the precise details of the malformed packet,
or the proof-of-concept exploit code due to the danger of an exploit being
released before the majority of the Nortel VPN users have upgraded to the
fixed version.
Affected Versions:
The issues affects Nortel VPN router models 1010, 1050, 1100, 600, 1600,
1700, 2600, 2700, 4500, 4600 and 5000. We believe that all current
software versions on the affected models are vulnerable.
Solution:
Upgrade to software version V5.05_200 or later. Nortel customers with a
valid login may obtain the new software from the Nortel technical support
website:
http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp
Patches for earlier software releases 4.76, 4.85, 4.90 and 5.00 are
expected to be available within a few weeks.
Timeline:
The vulnerability was first discovered on 3rd March 2005, and was
immediately reported to the customer and Nortel Networks security
team. Nortel reproduced the issue, and developed a fix. The fixed version
for the latest software was released on 27th May 2005.
Further Information:
For further information, including technical details and screenshots, see:
http://www.nta-monitor.com/news/vpn-flaws/nortel/nortel-client/
We would like to thank Nortel Networks for responding promptly to this
issue, and producing a software fix to address it.
Roy Hills
--
Roy Hills Tel: +44 1634 721855
NTA Monitor Ltd FAX: +44 1634 721844
14 Ashford House, Beaufort Court,
Medway City Estate, Email: Roy.Hills@xxxxxxxxxxxxxxx
Rochester, Kent ME2 4FA, UK WWW: http://www.nta-monitor.com/