VID |
29122 |
Severity |
40 |
Port |
161 |
Protocol |
UDP |
Class |
CISCO |
Detailed Description |
The Cisco IOS, according to its version number, has a denial of service vulnerability in MPLS packet processing (CISCO bug ID CSCeb56909). Multi Protocol Label Switching (MPLS) is a vendor-independent protocol that integrates layer-2 information into layer-3. CISCO IOS versions 12.1T, 12.2, 12.2T, 12.3 and 12.3T that supports MPLS processing are vulnerable to a denial of service vulnerability, caused by exception handling error in the processing of Multi Protocol Label Switching (MPLS) packets. A remote attacker could send specially crafted packet to the MPLS interface on the target device to cause the device to reload. A device that supports MPLS is vulnerable even if that device is not configured for MPLS.
* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.
* References: http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml http://www.kb.cert.org/vuls/id/583638 http://www.us-cert.gov/cas/techalerts/TA05-026A.html http://securitytracker.com/alerts/2005/Jan/1013015.html
* Platforms Affected: Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T versions Cisco Router Series: 2600, 2800, 3600, 3700, 3800, 4500 and 4700 Cisco Access Server: 5300, 5350 and 5400 |
Recommendation |
Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (Crafted Packet Causes Reload on Cisco Routers) at http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com |
Related URL |
CVE-2005-0197 (CVE) |
Related URL |
12369 (SecurityFocus) |
Related URL |
19071 (ISS) |
|