Korean
<< Back
VID 29034
Severity 30
Port 161
Protocol UDP
Class CISCO
Detailed Description The CISCO VPN concentrator has a ISAKMP packet processing vulnerability (Cisco bug ID CSCdy38035). This vulnerability can be exploited to initiate a DOS attack.
Malformed or very large ISAKMP packets can cause device reloads in four instances:
- Upon receipt of a malformed ISAKMP packet
- Upon having debug turned on during the receipt of various malformed packets
- Upon receiving a very large number of payloads in an ISAKMP packet
- Upon having debug turned on while receiving large ISAKMP packets.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml

* Platforms Affected:
Cisco VPN 3000 series concentrator: 3.6(Rel), earlier than 3.5.5, 3.1.x, 3.0.x, 2.x.x
Recommendation Upgrade to the Cisco VPN 3000 series concentrator version 3.5.5 or later, and 3.6.1 or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .

For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)