CERT RENATER
Nous contacter
- Mail : cert@support.renater.fr
- Web : Pages du CERT
- Tél : 01.53.94.20.44
- Fax : 01.53.94.20.31
==================================================================== CERT-Renater Note d'Information No. 2010/VULN344 _____________________________________________________________________ DATE : 08/09/2010 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Cisco Wireless LAN Controller. ====================================================================== http://www.cisco.com/warp/public/707/cisco-sa-20100908-wlc.shtml ______________________________________________________________________ Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers Advisory ID: cisco-sa-20100908-wlc Revision 1.0 For Public Release 2010 September 08 1600 UTC (GMT) +--------------------------------------------------------------------- Summary ======= The Cisco Wireless LAN Controller (WLC) product family is affected by these vulnerabilities: * Two denial of service (DoS) vulnerabilities * Three privilege escalation vulnerabilities * Two access control list (ACL) bypass vulnerabilities Note: These vulnerabilities are independent of one another. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities. This advisory is posted at: http://www.cisco.com/warp/public/707/cisco-sa-20100908-wlc.shtml Affected Products ================= Vulnerable Products +------------------ These products are each affected by at least one vulnerability covered in this Security Advisory: * Cisco 2000 Series WLCs * Cisco 2100 Series WLCs * Cisco 4100 Series WLCs * Cisco 4400 Series WLCs * Cisco 5500 Series WLCs * Cisco Wireless Services Modules (WiSMs) * Cisco WLC Modules for Integrated Services Routers (ISRs) * Cisco Catalyst 3750G Integrated WLCs DoS Vulnerabilities ~~~~~~~~~~~~~~~~~~~ The Cisco WLC product family is affected by two DoS vulnerabilities: * Internet Key Exchange (IKE) DoS Vulnerability * HTTP DoS Vulnerability The IKE DoS vulnerability affects Cisco WLC software versions 3.2 and later. The HTTP DoS vulnerability affects Cisco WLC software versions 4.2 and later. Privilege Escalation Vulnerabilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The privilege escalation vulnerabilities affect Cisco WLC software versions 4.2 and later. CPU ACL Bypass Vulnerabilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ One of the two ACL bypass vulnerabilities affects Cisco WLC software versions 4.1 and later. The second ACL bypass vulnerability affects Cisco WLC software versions 6.0.x. Determination of Software Versions ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Administrators can use these instructions to determine the software version that is running on the Cisco WLCs (using the web or command-line interface) or on the Cisco WiSM (using commands on the Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Router). Cisco Wireless Controllers ~~~~~~~~~~~~~~~~~~~~~~~~~~ To determine the WLC version that is running in a given environment, use one of these methods: * In the web interface, choose the "Monitor" tab, click "Summary" in the left pane, and note the "Software" Version field. Note: Customers who use a Cisco WLC Module in an ISR will need to issue the "service-module wlan-controllersession" command prior to performing the next step on the command line. Customers who use a Cisco Catalyst 3750G Switch with an integrated WLC Module will need to issue the "session processor 1 session" command prior to performing the next step on the command line. * From the command-line interface, type "show sysinfo" and note the "Product Version" field, as shown in this example: (Cisco Controller)> show sysinfo Manufacturer's Name.. Cisco Systems Inc. Product Name......... Cisco Controller Product Version...... 5.1.151.0 RTOS Version......... Linux-2.6.10_mvl401 Bootloader Version... 4.0.207.0 Build Type........... DATA + WPS