| VID |
29034 |
| Severity |
30 |
| Port |
161 |
| Protocol |
UDP |
| Class |
CISCO |
| Detailed Description |
The CISCO VPN concentrator has a ISAKMP packet processing vulnerability (Cisco bug ID CSCdy38035). This vulnerability can be exploited to initiate a DOS attack. Malformed or very large ISAKMP packets can cause device reloads in four instances: - Upon receipt of a malformed ISAKMP packet - Upon having debug turned on during the receipt of various malformed packets - Upon receiving a very large number of payloads in an ISAKMP packet - Upon having debug turned on while receiving large ISAKMP packets.
* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.
* References: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
* Platforms Affected: Cisco VPN 3000 series concentrator: 3.6(Rel), earlier than 3.5.5, 3.1.x, 3.0.x, 2.x.x |
| Recommendation |
Upgrade to the Cisco VPN 3000 series concentrator version 3.5.5 or later, and 3.6.1 or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .
For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|