Cisco IOS Hot Standby Routing Protocol IP Collision Denial of Service

medium Nessus Plugin ID 17773

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The design of the Hot Standby Routing Protocol, when using IRPAS, allows remote attackers to cause a denial of service via a router with the same IP address as the interface on which HSRP is running.

Solution

Apply the relevant patch, which can be obtained from the Cisco Bug tracker.

See Also

https://seclists.org/bugtraq/2002/Jun/33

Plugin Details

Severity: Medium

ID: 17773

File Name: cisco-20020606-irpas.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 1/10/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/6/2002

Vulnerability Publication Date: 6/5/2002

Reference Information

CVE: CVE-2002-2053

BID: 4949

CISCO-BUG-ID: CSCdu38323