[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CSIRTUK ADVISORY - 3271 - Cisco - Security Response: Vulnerability in Java Secure Socket Extension



______________________________________________________________________________


CSIRTUK ADVISORY - 3271 dated 26.07.07 time 16:00

Centre for the Protection of National Infrastructure

______________________________________________________________________________

 Further details about CPNI, including information about our products can be

 found at www.cpni.gov.uk
______________________________________________________________________________

Title
=====
Title: Cisco Security Response: Vulnerability in Java Secure Socket Extension

Abstract: Some versions of Sun JSSE do not properly handle certain Transport
Layer Security (TLS) or Secure Sockets Layer (SSL) handshake requests. A
device running an affected JSSE version will experience excessive CPU usage,
which may affect normal device operation and result in a denial of service
(DoS) condition.

Detail
======

Cisco Security Response: Vulnerability in Java Secure Socket Extension
ID: 3271
Date: 26 July 2007 09:54

-------------------------------------------------------------------------------
Title: Cisco Security Response: Vulnerability in Java Secure Socket Extension

Abstract: Some versions of Sun JSSE do not properly handle certain Transport
Layer Security (TLS) or Secure Sockets Layer (SSL) handshake requests. A
device running an affected JSSE version will experience excessive CPU usage,
which may affect normal device operation and result in a denial of service
(DoS) condition.

Vendors affected:CISCO
Operating Systems affected: Solaris, Linux, and Windows
Applications affected:Java Secure Socket Extension (JSSE), Cisco Unified
CallManager and Cisco Unified Presence
Advisory type: Information
Warning Status: Information only
Potential Damage: Host DoS
Availability of fix: Available
Type of fix: Patch
Source: Cisco
Reliability of source: Trusted
Source URL: http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml

      -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 Cisco Security Response: Vulnerability in Java Secure Socket
Extension http://www.cisco.com/warp/public/707/cisco-sr-20070725-jsse.shtml
Revision 1.0
For Public Release 2007 July 25 1600 UTC (GMT)

+--------------------------------------------------------------------
Cisco Response
==============

This is the Cisco PSIRT response to the vulnerability in Java Secure Socket
Extension (JSSE) disclosed by Sun Microsystems on July 10, 2007, the details
of which are available at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102997-1.

There are no workarounds available for this vulnerability. Cisco recommends
that customers update all vulnerable applications and components to provide
the greatest protection from the listed vulnerability. Cisco will update this
document in the event of any changes.

Additional Information
======================

Some versions of Sun JSSE do not properly handle certain Transport Layer
Security (TLS) or Secure Sockets Layer (SSL) handshake requests.
A device running an affected JSSE version will experience excessive CPU usage,
which may affect normal device operation and result in a denial of service
(DoS) condition.

Sun has provided a comprehensive list of affected JSSE versions at the
previously listed URL. Please refer to the Sun Alert Notification for details.

Products Affected by the JSSE Vulnerability
+------------------------------------------

Note: The following list is subject to change. Cisco is continuing to review
the potential impact of this vulnerability on its products; this list may be
updated to include additional Cisco products that are affected by this
vulnerability.

The following products are affected by the Sun JSSE issue listed in this
Security Response:

  * Cisco Unified Call Manager - Cisco bug ID is CSCsh63934. Fixed
  software is available as releases 5.1(2) and 6.0(1). Customers running
  release 5.0 are advised to migrate to release 5.1(2) or later.
  Releases before 5.0 are not affected.

  * Cisco Unified Presence - Cisco bug ID is CSCsi77690. Fixed software
  is available as release 6.0(1). Customers running earlier versions are
  advised to migrate to release 6.0(1) or later.

Workarounds
+----------

There is no workaround for this issue, but mitigation is possible.

Cisco Unified CallManager and Cisco Unified Presence customers are advised to
restrict access to the administrative interface to the IP addresses of known
management stations. Information on how to implement such access restrictions
is available at the following link:

http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_implementation_design_guide_chapter09186a008085f858.html

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF
GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS
LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO
CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

Revision History
================

+-----------------------------------------------------------+
| Revision 1.0  | 2007-July-25  | Initial public release    |
+-----------------------------------------------------------+

Cisco Security Procedures
=========================

Complete information on reporting security vulnerabilities in Cisco products,
obtaining assistance with security incidents, and registering to receive
security information from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.

+--------------------------------------------------------------------
All contents are Copyright (C) 2006-2007 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------

Updated: Jul 25, 2007                              Document ID: 97830

+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGp29J8NUAbBmDaxQRAquxAJ9DAvYwVb4G11mf5+xVsQ1ZcG55hQCfUwhX
Ote8IEVStps8zvcXmh/qZZU=
=WCDS
-----END PGP SIGNATURE-----


______________________________________________________________________________

CPNI values your feedback.

1. Which of the following most reflects the value of the advisory to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our advisories?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk by
telephone.

You may send Not Protectively Marked information via e-mail to
csirtuk@xxxxxxxxxxxxxxxx

Office hours:

Mon - Fri: 09:00 - 16:30 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

This advisory contains information released by the original author. Some of
the information may have changed since it was released. If the issue affects
you, it may be prudent to retrieve the advisory from the site of the original
source to ensure that you receive the most current information concerning that
problem. Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by CPNI.

The views and opinions of authors expressed within this notice shall not be
used for advertising or product endorsement purposes. CPNI shall not accept
responsibility for any errors or omissions contained within this advisory. In
particular, they shall not be liable for any loss or damage whatsoever,
arising from or in connection with the usage of information contained within
this advisory.

CSIRTUK is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response Teams
(IRTs) in order to foster cooperation and coordination in incident prevention,
to prompt rapid reaction to incidents, and to promote information sharing
amongst its members and the community at large.
______________________________________________________________________________

<End of CSIRTUK Advisory>





______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________