| VID |
29097 |
| Severity |
30 |
| Port |
161 |
| Protocol |
TCP |
| Class |
CISCO |
| Detailed Description |
The Cisco IOS has a denial service vulnerability by the Malformed OSPF Packet (CISCO bug ID CSCec16481). Cisco IOS releases based on 12.0S, 12.2, and 12.3 and enabled for the OSPF protocol, are vulnerable to a Denial of Service (DoS) attack from a malformed OSPF packet. The Open Shortest Path First (OSPF) protocol is not enabled by default. If the device is enabled for the OSPF protocol, a remote attacker, with knowledge of the device's OSPF area number, netmask, hello, and dead timers, could send a malformed OSPF packet to cause the device to reload.
* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. If the remote Cisco device has not enabled the OSPF protocol, please ignore this alert.
* References: http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml http://www.kb.cert.org/vuls/id/989406 http://www.osvdb.org/displayvuln.php?osvdb_id=9009 http://www.ciac.org/ciac/bulletins/o-199.shtml
* Platforms Affected: Cisco Systems, Inc. IOS 12.2 Cisco Systems, Inc. IOS 12.0S Cisco Systems, Inc. IOS 12.3 |
| Recommendation |
Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (Cisco IOS Malformed OSPF Packet Causes Reload) at http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml .
Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com .
For details, see http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml . |
| Related URL |
(CVE) |
| Related URL |
10971 (SecurityFocus) |
| Related URL |
17033 (ISS) |
|