IPv6 and security: news from the front – June
New publications
A Novel Way of Abusing IPv6 Extension Headers to Evade IPv6 Security Devices by Antonios Atlasis, article published on the Insinuator blog
In this article, Antonios Atlasis presents a new way to bypass IDS by modifying the Next Header field of Extension Headers of type Fragment Header.
m0n0wall as an IPv6 firewall by Antonios Atlasis, article published on the Insinuator blog
Antonios Atlasis briefly examined the IPv6-related features offered by m0n0wall. He presents his findings in this article.
Why is IPv6 layer-2 security so complex (and how to fix it) by Ivan Pepelnjak, article published on the ipSpace blog
Starting with the question "why is Layer 2 security complex with IPv6?", Ivan Pepelnjak presents his vision of a "perfect world" where Layer 2 connectivity would only be used between two adjacent nodes. In this world, there would be no more RA spoofing, ND spoofing, DHCPv6 spoofing, or IPv6 address spoofing.
New vulnerabilities
CVE-2014-2176 (Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability)
- Affected product: Cisco IOS XR
- Impact: Denial of service (CVSS Base Score = 7.1)
CVE-2014-3814 (NetScreen Firewall: Malformed IPv6 packet DoS issue)
- Affected product: ScreenOS
- Impact : crash of the equipment (CVSS Base Score = 7.8)
CVE-2014-4167 (OpenStack Neutron L3-agent IPv6 Prefix SNAT Rules Handling Remote DoS)
- Affected product: OpenStack Neutron
- Impact: Denial of service
