Korean
<< Back
VID 29126
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS, according to its version number, has an arbitrary code execution by a crafted IPv6 packet by a crafted IPv6 packet (CISCO bug ID CSCef68324). IPv6 is the "Internet Protocol Version 6", designed by the Internet Engineering Task Force (IETF) to replace the current version Internet Protocol, IP Version 4 (IPv4). Cisco IOS versions 12.0 through 12.4, and XR versions prior to 3.2 could allow a remote attacker to execute arbitrary code, or cause a denial of service, caused by exception handling error in the processing of IPv6 packet. If IPv6 is enabled on the device, a remote attacker could send a specially-crafted IPv6 packet, which would allow the attacker to gain full control of the affected device, or cause the device to reload, even if ipv6 unicast-routing is globally disabled.

* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. And also, if IPv6 is disabled, these vulnerabilities is not affected. Products running any version of Cisco IOS that do not have IPv6 configured interfaces are not vulnerable, in this case please ignore this alert.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml
http://www.ciac.org/ciac/bulletins/p-262.shtml
http://www.kb.cert.org/vuls/id/930892
http://www.us-cert.gov/cas/techalerts/TA05-210A.html
http://www.osvdb.org/18332
http://securitytracker.com/alerts/2005/Jul/1014598.html

* Platforms Affected:
Cisco IOS versions 12.0 through 12.4, and XR versions prior to 3.2
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (IPv6 Crafted Packet Vulnerability) at http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml

Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com
Related URL CVE-2005-2451 (CVE)
Related URL 14414 (SecurityFocus)
Related URL 21591 (ISS)