Korean
<< Back
VID 29047
Severity 30
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS has a IOS Reload after Scanning Vulnerability(Cisco Bug ID CSCds07326).
Some security scanning software can cause a memory error in Cisco IOS Software that will cause a reload to occur. The security scanner makes TCP connection attempts to various ports, looking for open ports to further investigate known vulnerabilities with those services associated with certain ports. However, by a side effect of the tests, the router will reload unexpectedly as soon as it receives a request to review or write the configuration file.

This vulnerability will occur when a connection is attempted to any of the following TCP ports: 3100-3999, 5100-5999, 7100-7999 and 10100-10999.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml
http://www.kb.cert.org/vuls/id/178024
http://www.ciac.org/ciac/bulletins/l-088.shtml

* Platforms Affected:
Cisco IOS 12.1
Recommendation Upgrade to the latest version of Cisco IOS, as listed in Cisco Security Advisory, http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml . Upgrades should be obtained through the Software Center on Cisco's Worldwide Web site at http://www.cisco.com .
Related URL CVE-2001-0750 (CVE)
Related URL 2804 (SecurityFocus)
Related URL 6589 (ISS)