Crafted Packet Causes Reload on Cisco Routers

This script is (C) 2010-2014 Tenable Network Security, Inc.

Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Cisco Routers running Internetwork Operating System (IOS) that supports
Multi Protocol Label Switching (MPLS) are vulnerable to a Denial of
Service (DoS) attack on interfaces where MPLS is not configured. A
system that supports MPLS is vulnerable even if that system is not
configured for MPLS.
The vulnerability is only present in Cisco IOS release trains based on
12.1T, 12.2, 12.2T, 12.3 and 12.3T. Releases based on 12.1 mainline,
12.1E and all releases prior to 12.1 are not vulnerable.
Cisco has made free software available to address this vulnerability.
There are workarounds available to mitigate the effects.

See also :

Solution :

Apply the relevant patch referenced in Cisco Security Advisory

Risk factor :

Medium / CVSS Base Score : 6.1
CVSS Temporal Score : 4.9
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48982 (cisco-sa-20050126-leshttp.nasl)

Bugtraq ID: 12369

CVE ID: CVE-2005-0197

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial