Korean
<< Back
VID 29129
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS, according to its version number, has a denial of service vulnerability (CISCO bug ID CSCsb11124) in the SGBP packet processing. SGBP(Stack Group Bidding Protocol) is used in the MMP (Multichassis Multilink PPP) system. Cisco IOS versions 12.0 through 12.4 are vulnerable a denial of service vulnerability, caused by an error in the handling of a SGBP packet. By sending a specially-crafted UDP packet to port 9900 of the affected device, a remote attacker could cause the device to stop responding until the system watchdog timer initiates a reset of the device.

* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. And also, if SGBP is disabled, please ignore this alert.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20060118-sgbp.shtml
http://securitytracker.com/alerts/2006/Jan/1015501.html
http://www.frsirt.com/english/advisories/2006/0248
http://www.osvdb.org/22624
http://secunia.com/advisories/18490

* Platforms Affected:
Cisco IOS versions 12.0 through 12.4
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (IOS Stack Group Bidding Protocol Crafted Packet DoS) at http://www.cisco.com/warp/public/707/cisco-sa-20060118-sgbp.shtml

Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com
Related URL CVE-2006-0340 (CVE)
Related URL 16303 (SecurityFocus)
Related URL 24182 (ISS)