Korean
<< Back
VID 29097
Severity 30
Port 161
Protocol TCP
Class CISCO
Detailed Description The Cisco IOS has a denial service vulnerability by the Malformed OSPF Packet (CISCO bug ID CSCec16481).
Cisco IOS releases based on 12.0S, 12.2, and 12.3 and enabled for the OSPF protocol, are vulnerable to a Denial of Service (DoS) attack from a malformed OSPF packet. The Open Shortest Path First (OSPF) protocol is not enabled by default. If the device is enabled for the OSPF protocol, a remote attacker, with knowledge of the device's OSPF area number, netmask, hello, and dead timers, could send a malformed OSPF packet to cause the device to reload.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. If the remote Cisco device has not enabled the OSPF protocol, please ignore this alert.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml
http://www.kb.cert.org/vuls/id/989406
http://www.osvdb.org/displayvuln.php?osvdb_id=9009
http://www.ciac.org/ciac/bulletins/o-199.shtml

* Platforms Affected:
Cisco Systems, Inc. IOS 12.2
Cisco Systems, Inc. IOS 12.0S
Cisco Systems, Inc. IOS 12.3
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (Cisco IOS Malformed OSPF Packet Causes Reload) at http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml .

Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com .

For details, see http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml .
Related URL (CVE)
Related URL 10971 (SecurityFocus)
Related URL 17033 (ISS)