{"vuid":"VU#784540","idnumber":"784540","name":"BGP implementations do not adequately handle malformed BGP OPEN and UPDATE messages","keywords":["malformed BGP open message","DoS","denial of service","update","cisco"],"overview":"Multiple implementations of the Border Gateway Protocol (BGP) contain vulnerabilities related to the processing of UPDATE and OPEN messages. The impacts of these vulnerabilities appear to be limited to denial of service.","clean_desc":"BGP (RFC 1771) is designed to exchange network reachability information between peer nodes. Information advertised by a BGP system to its peers includes timers, metrics, and paths to different Autonomous System (AS) networks. Routing between AS networks depends on BGP, and the Internet is a network of AS networks. Therefore, vulnerabilities in BGP have the potential to affect the Internet infrastructure. Multiple BGP implementations contain vulnerabilities handling exceptional OPEN and UPDATE messages. While the details of the individual vulnerabilities are different, the impacts appear to be limited to denial of service. In addition, most BGP implementations do not accept messages from arbitrary sources. Some BGP implementations only accept TCP connections (179/tcp) from properly configured peers, and some implementations require a valid AS number in the BGP message data. To deliver malicious messages to such systems, an attacker would need to spoof a TCP connection or have access to a trusted BGP peer. The attacker may also need to know a valid AS number. For information about specific BGP implementations, please see the Systems Affected section below.","impact":"A remote attacker can cause a denial of service in a vulnerable system. In most cases, the attacker would need to act as a valid BGP peer. BGP session instability can result in \"flapping\" and other routing problems that may adversely affect Internet traffic.","resolution":"Apply a patch or upgrade\nApply a patch or upgrade as specified by your vendor.","workarounds":"Restrict BGP access Using access control lists (ACLs) and BGP configuration settings, restrict access to valid networks and BGP peers. Authenticate BGP messages TCP MD5 (RFC 2385), IPsec, and S-BGP provide cryptographic authentication of network connections and/or BGP messages. Various performance and key distribution issues are associated with these authentication methods. Use out-of-band management channels When possible, use an out-of-band channel, such as a separate network, to transmit BGP other management traffic.","sysaffected":"","thanks":"These vulnerabilities were reported as a result of research done by Cisco. Thanks to Cisco for sharing this research and helping to coordinate the disclosure of information about these vulnerabilities.","author":"This document was written by Art Manion.","public":["http://www.ietf.org/rfc/rfc1771.txt","http://www.ietf.org/internet-drafts/draft-ietf-idr-bgp4-experience-protocol-04.txt","http://www.ietf.org/rfc/rfc2385.txt","http://www.net-tech.bbn.com/sbgp/draft-clynn-s-bgp-protocol-01.txt","http://www.nanog.org/mtg-0306/pdf/franz.pdf","http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml"],"cveids":["CVE-2004-0589"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-05-27T13:15:21Z","publicdate":"2004-06-16T00:00:00Z","datefirstpublished":"2004-06-16T14:58:09Z","dateupdated":"2004-06-28T16:09:29Z","revision":39,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"13","cam_impact":"8","cam_easeofexploitation":"14","cam_attackeraccessrequired":"9","cam_scorecurrent":"8.5995","cam_scorecurrentwidelyknown":"9.828","cam_scorecurrentwidelyknownexploited":"14.742","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.5995,"vulnote":null}