Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Cisco Jabber Extensible Communications Platform and Cisco Unified Presence XML Denial of Service Vulnerability

 
Threat Type:CWE-399: Resource Management Errors
IntelliShield ID:24192
Version:1
First Published:2011 September 28 16:47 GMT
Last Published:2011 September 28 16:47 GMT
Port: Not available
CVE:CVE-2011-3287 , CVE-2011-3288
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
CVSS Base:7.8 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:6.4
Related Resources:
View related Security Advisory
 
 
Version Summary:

Cisco Jabber Extensible Communications Platform and Cisco Unified Presence contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service vulnerability.  Updates are available.

 
 
Description

Cisco Jabber Extensible Communications Platform (Jabber XCP) and Cisco Unified Presence contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system.

An unauthenticated, remote attacker can exploit the vulnerability by sending malicious XML content to an affected system.  If successful, the attacker could trigger the exhaustion of resources, leading to a temporary DoS condition.  Repeated attacks could result in a sustained DoS condition, disrupting normal operations for users.

Functional exploit code is publicly available.

Cisco has confirmed this vulnerability in a security advisory and has issued updated software.

 
Warning Indicators

The following products are vulnerable:

  • Cisco Unified Presence software versions prior to 8.5(4)
  • Jabber XCP software versions prior to 5.4.0.27581 and prior to 5.8.1.27561
 
IntelliShield Analysis

It is likely that an attacker would need to have access to an internal, private network to successfully exploit this vulnerability.  This requirement could limit the possibility of a successful attack.

 
Vendor Announcements

Cisco has released a security advisory for Cisco bug IDs CSCtq78106, CSCtq89842, and CSCtq88547 at the following link: cisco-sa-20110928-xcpcupsxml

 
Impact

Successful exploitation could allow an unauthenticated, remote attacker to cause a DoS condition on an affected server by exhausting available system resources.  Repeated exploits could result in a sustained DoS condition, disrupting normal operations for users for longer durations.

 
Technical Information

The vulnerability is due to the parsing of XML data in both Jabber XCP, including JabberNow appliances, and Cisco Unified Presence.  These products are vulnerable to the Exponential Entity Expansion attack.  This attack is better known as an XML Bomb, referring to an XML document that is considered to be valid by the rules of the XML schema, but causes the parser or underlying server to crash or hang.  This attack is also more commonly referred to the Billion Laughs Attack, due to the use of XML parsers to expand the string lol or ha up to a billion times or until server resources were exhausted. 

This attack combines certain properties of XML to create valid but malicious XML using an extreme level of nested substitutions.  When the XML parser attempts to expand all the nested entities, it will exhaust all the server resources.

An unauthenticated, remote attacker could trigger high CPU and memory usage from the XML parsers in Jabber XCP, including JabberNow appliances, and Cisco Unified Presence.  This will result in the exhaustion of resources, causing processes to crash.  This attack affects both client-to-server connections as well as server-to-server (federation) links.

 
Safeguards

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.

Administrators are advised to monitor affected systems.

 
Patches/Software

Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at tac@cisco.com.

 
Alert History
 

Initial Release



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
CiscoCisco Unified Presence Server 1.0 .1, .2, .3 | 6.0 Base, .1, .2, .3, .4, .5, .6, .7 | 7.0 Base, .1, .2, .3, .4, .5, .6, .7, .8 | 8.0 .1, .2 | 8.5 .1, .2, .3
CiscoCisco Jabber Extensible Communications Platform (Jabber XCP) 4.0 Base | 5.2 Base | 5.4 Base | 5.8 Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield