Cisco 发布了六个安全公告,以应对发现于 Cisco IOS、IOS XE、NX-OS 及 Cisco Unified Communications Manager 软件中的漏洞。未通过认证的远程攻击者可以利用有关功能或规约来攻击这些漏洞,包括会话初始协议(SIP)、DHCPv6 relay 功能,互联网密码匙交换第二版本(IKEv2) 分段码的处理、 smart install 客户端安装功能、Locator/ID Separation Protocol (LISP)、以及 Wide Area Application Services (WAAS) Express 功能。
这些漏洞可透过多种方式攻击,远程攻击者可向受影响装置传送异常的SIP讯息或LISP封包、特制的 DHCPv6 relay 讯息、UDP 封包、Smart Install 封包或 TCP 分段。
关于受影响产品的详细数据,请参阅供货商网站相关安全公告中 “Affected Products” 的部分:
01. Cisco IOS 、IOS XE 及 Cisco Unified Communications Manager 软件 Session Initiation Protocol 内存泄漏漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip
02. Cisco IOS 及 IOS XE 软件 DHCPv6 Relay 服务阻断漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6
03. Cisco IOS 及 IOS XE 软件互联网密码匙交换第二版本分段服务阻断漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2
04. Cisco IOS 及 IOS XE 软件 Smart Install 服务阻断漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi
05. Cisco IOS 及 NX-OS 软件 Locator/ID Separation Protocol 封包服务阻断漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp
06. Cisco IOS 软件 Wide Area Application Services Express 服务阻断漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f
成功利用这些漏洞可以引致受影响服务受阻断或装置重新启动。
适用于受影响系统的修补程序已可获取。受影响系统的用户应遵从产品供货商的建议,立即采取行动以降低风险。有关修补程序的详细数据,请参阅供货商网站的相应安全公告中有关 “Obtaining Fixed Software” 的部分。
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f
https://www.hkcert.org/my_url/en/alert/16032401
https://www.us-cert.gov/ncas/current-activity/2016/03/23/Cisco-Release-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1344
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1347
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1348
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1349
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1351