Crafted Packet Causes Reload on Cisco Routers

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Cisco Routers running Internetwork Operating System (IOS) that supports
Multi Protocol Label Switching (MPLS) are vulnerable to a Denial of
Service (DoS) attack on interfaces where MPLS is not configured. A
system that supports MPLS is vulnerable even if that system is not
configured for MPLS.
The vulnerability is only present in Cisco IOS release trains based on
12.1T, 12.2, 12.2T, 12.3 and 12.3T. Releases based on 12.1 mainline,
12.1E and all releases prior to 12.1 are not vulnerable.
Cisco has made free software available to address this vulnerability.
There are workarounds available to mitigate the effects.

See also :

http://www.nessus.org/u?795df75a
http://www.nessus.org/u?ec7708a5

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20050126-les.

Risk factor :

Medium / CVSS Base Score : 6.1
(CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 4.9
(CVSS2#E:U/RL:W/RC:C)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48982 (cisco-sa-20050126-leshttp.nasl)

Bugtraq ID: 12369

CVE ID: CVE-2005-0197