Cisco IOS Software TELNET Option Handling Vulnerability - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A defect in multiple Cisco IOS software versions will cause a Cisco
router to reload unexpectedly when the router is tested for security
vulnerabilities by security scanning software programs. The defect can
be exploited repeatedly to produce a consistent denial of service (DoS)
attack.
Customers using the affected Cisco IOS software releases are urged to
upgrade as soon as possible to later versions that are not vulnerable
to this defect. Vulnerable products and releases are listed in detail
below.
The security scanner is testing for the presence of two specific
vulnerabilities that affect certain UNIX-based systems. The
vulnerabilities are unrelated to Cisco IOS software and Cisco IOS
software is not directly at risk from them. However, a side-effect of
the tests exposes the defect described in this security advisory, and
the router will reload unexpectedly as soon as it receives any
subsequent traffic.
This defect is documented as Cisco Bug ID CSCdm70743.

See also :

http://www.nessus.org/u?bad63371
http://www.nessus.org/u?d9a6451a

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20000420-ios-telnet.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.2
(CVSS2#E:U/RL:U/RC:ND)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48948 (cisco-sa-20000420-ios-telnethttp.nasl)

Bugtraq ID: 1123

CVE ID: CVE-2000-0268