CERT Recently Published Vulnerability Notes 2024年07月06日
VU#347067: Multiple BGP implementations are vulnerable to improperly formatted BGP updates
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

多个 BGP 实现被发现存在一个漏洞,该漏洞可能导致攻击者通过精心构造的 BGP UPDATE 消息中的路径属性,使路由器重置 TCP 连接并断开 BGP 会话。这种行为可能导致路由不稳定,影响网络连接。该漏洞已在 OpenBSD、Juniper、FRR、OpenBGPd 和 EXOS 等多个厂商的 BGP 实现中被发现。

😈 BGP 路由协议中的路径属性错误处理漏洞:多个 BGP 实现被发现存在一个漏洞,该漏洞可能导致攻击者通过精心构造的 BGP UPDATE 消息中的路径属性,使路由器重置 TCP 连接并断开 BGP 会话。

😈 攻击者可以通过发送特制的 BGP UPDATE 消息,使受影响的路由器与任何接收该消息的链路断开连接。

😈 即使不受影响的路由器可能会将特制的 UPDATE 消息传递到网络中,最终可能导致受影响的路由器从多个来源接收该消息,导致多个链路失效。

😈 一些厂商提供了缓解措施,例如 Juniper 的 `set protocols bgp bgp-error-tolerance` 和 Nokia 的 `[router bgp group] error-handling update-fault-tolerance` 可以帮助缓解这种行为。

😈 该漏洞可能导致路由不稳定,影响网络连接。攻击者可以利用该漏洞进行拒绝服务攻击,或干扰网络流量。

😈 建议使用最新版本的 BGP 实现,并及时更新系统补丁。

Overview

Multiple BGP implementations have been identified as vulnerable to specially crafted Path Attributes of a BGP UPDATE. Instead of ignoring invalid updates they reset the underlying TCP connection for the BGP session and de-peer the router.

This is undesirable because a session reset impacts not only routes with the BGP UPDATE but also the other valid routes exchanged over the session. RFC 7606 Introduction

Description

The Border Gateway Protocol (BGP, RFC 4271) is a widely used inter-Autonomous System routing protocol. BGP communication among peer routers is critical to the stable operation of the Internet. A number of known BGP security issues were addressed in RFC 7606 Revised Error Handling for BGP UPDATE Messages in 2015.

Recent reports indicate that multiple BGP implementations do not properly handle specially crafted Path Attributes in the BGP UPDATE messages. An attacker with a valid, configured BGP session could inject a specially crafted packet into an existing BGP session or the underlying TCP session (179/tcp). A vulnerable BGP implementation could drop sessions when processing crafted UPDATE messages. A persistent attack could lead to routing instability (route flapping).

This vulnerability was first announced as affecting OpenBSD based routers. Further investigation indicates that other vendors are affected by the same or similar issues. Please see the Systems Affected section below.Here are the CVE IDs that were reserved by the reporter for different vendors that were tested:

Impact

A remote attacker could publish a BGP UPDATE with a crafted set of Path Attributes, causing vulnerable routers to de-peer from any link from which such an update were received. Unaffected routers might also pass the crafted updates across the network, potentially leading to the update arriving at an affected router from multiple sources, causing multiple links to fail.

Solution

The CERT/CC is currently unaware of a practical solutions for every vendor but some of the vendors allow you to change the response to errors in BGP path updates. Networks using appliances from Juniper and Nokia can mitigate this behavior by enabling:

(Juniper)
set protocols bgp bgp-error-tolerance

(Nokia)
[router bgp group]
error-handling update-fault-tolerance

Acknowledgements

Thanks to the reporter Ben Cartwright-Cox. This document was written by Timur Snoke.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs:
Date Public: 2023-09-12
Date First Published: 2023-09-12
Date Last Updated: 2023-11-16 14:03 UTC
Document Revision: 3

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

BGP 路由协议 漏洞 网络安全 路径属性
相关文章