Cisco IOS Malformed BGP Packet Causes Reload - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch

Description :

A Cisco device running IOS and enabled for the Border Gateway Protocol
(BGP) is vulnerable to a Denial of Service (DOS) attack from a
malformed BGP packet. The BGP protocol is not enabled by default, and
must be configured in order to accept traffic from an explicitly
defined peer. Unless the malicious traffic appears to be sourced from a
configured, trusted peer, it would be difficult to inject a malformed
packet.
Cisco has made free software available to address this problem.

See also :

http://www.nessus.org/u?c84cd1f7
http://www.nessus.org/u?bafedead

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20040616-bgp.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.0
(CVSS2#E:U/RL:W/RC:C)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48975 (cisco-sa-20040616-bgphttp.nasl)

Bugtraq ID: 10560

CVE ID: CVE-2004-0589