Cisco IOS Malformed BGP Packet Causes Reload - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch

Description :

A Cisco device running IOS and enabled for the Border Gateway Protocol
(BGP) is vulnerable to a Denial of Service (DOS) attack from a
malformed BGP packet. The BGP protocol is not enabled by default, and
must be configured in order to accept traffic from an explicitly
defined peer. Unless the malicious traffic appears to be sourced from a
configured, trusted peer, it would be difficult to inject a malformed
packet.
Cisco has made free software available to address this problem.

See also :

http://www.nessus.org/u?c84cd1f7
http://www.nessus.org/u?bafedead

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20040616-bgp.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.0
(CVSS2#E:U/RL:W/RC:C)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48975 (cisco-sa-20040616-bgphttp.nasl)

Bugtraq ID: 10560

CVE ID: CVE-2004-0589

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial