Korean
<< Back
VID 29122
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS, according to its version number, has a denial of service vulnerability in MPLS packet processing (CISCO bug ID CSCeb56909). Multi Protocol Label Switching (MPLS) is a vendor-independent protocol that integrates layer-2 information into layer-3. CISCO IOS versions 12.1T, 12.2, 12.2T, 12.3 and 12.3T that supports MPLS processing are vulnerable to a denial of service vulnerability, caused by exception handling error in the processing of Multi Protocol Label Switching (MPLS) packets. A remote attacker could send specially crafted packet to the MPLS interface on the target device to cause the device to reload. A device that supports MPLS is vulnerable even if that device is not configured for MPLS.

* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml
http://www.kb.cert.org/vuls/id/583638
http://www.us-cert.gov/cas/techalerts/TA05-026A.html
http://securitytracker.com/alerts/2005/Jan/1013015.html

* Platforms Affected:
Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T versions
Cisco Router Series: 2600, 2800, 3600, 3700, 3800, 4500 and 4700
Cisco Access Server: 5300, 5350 and 5400
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (Crafted Packet Causes Reload on Cisco Routers) at http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml

Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com
Related URL CVE-2005-0197 (CVE)
Related URL 12369 (SecurityFocus)
Related URL 19071 (ISS)