| VID |
29056 |
| Severity |
40 |
| Port |
161 |
| Protocol |
UDP |
| Class |
CISCO |
| Detailed Description |
The Cisco IOS has a NTP buffer overflow vulnerability(CISCO Bug ID CSCdt93866). The successful exploitation may cause arbitrary code to be executed on the target machine. More often, an attempt to exploit this vulnerability will result in a daemon or device crash. Network Time Protocol (NTP) is used to synchronize time on multiple devices. By sending a crafted NTP control packet, it is possible to trigger a buffer overflow in the NTP daemon. Such exploitation, if it is possible at all, would require significant engineering skill and a thorough knowledge of the internal operation of Cisco IOS software or SUN Solaris operating system.
* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.
* References: http://www.cisco.com/warp/public/707/NTP-pub.shtml
* Platforms Affected: All releases of Cisco IOS software |
| Recommendation |
Upgrade to the fixed version of Cisco IOS, as listed in "Software Versions and Fixes" of Cisco Security Advisory, http://www.cisco.com/warp/public/707/NTP-pub.shtml . Upgrades should be obtained through the Software Center on Cisco's Worldwide Web site at http://www.cisco.com .
For workarounds, see also "Workarounds" of Cisco Security Advisory (NTP Vulnerability) above. |
| Related URL |
CVE-2001-0414 (CVE) |
| Related URL |
2540 (SecurityFocus) |
| Related URL |
6321 (ISS) |
|