Scanning for SSH Can Cause a Crash - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch

Description :

While fixing vulnerabilities mentioned in the Cisco Security Advisory
cisco-sa-20010627-ssh, a new vulnerability was introduced in some
products. When an attacker tries to exploit the vulnerability VU#945216
(described in the CERT/CC Vulnerability Note at
http://www.kb.cert.org/vuls/id/945216) the SSH module will consume too
much of the processor's time, effectively causing a DoS. In some cases
the device will reboot. In order to be exposed SSH must be enabled on
the device.
It is possible to mitigate this vulnerability by preventing, or having
control over, the SSH traffic.

See also :

http://www.nessus.org/u?7641e722
http://www.nessus.org/u?c4384600

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20020627-ssh-scan.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:U/RL:U/RC:C)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48967 (cisco-sa-20020627-ssh-scanhttp.nasl)

Bugtraq ID: 5114

CVE ID: CVE-2002-1024