Vulnerabilities in Cisco IOS Secure Shell Server - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Certain release trains of Cisco Internetwork Operating System (IOS),
when configured to use the IOS Secure Shell (SSH) server in combination
with Terminal Access Controller Access Control System Plus (TACACS+) as
a means to perform remote management tasks on IOS devices, may contain
two vulnerabilities that can potentially cause IOS devices to exhaust
resources and reload. Repeated exploitation of these vulnerabilities
can result in a denial of service (DoS) condition. Use of SSH with
other authentication methods like Remote Authentication Dial In User
Service (RADIUS) and the local user database may also be affected.

See also :

http://www.nessus.org/u?6f0e5315
http://www.nessus.org/u?088dd3a6

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20050406-ssh.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:H/RL:W/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 48983 (cisco-sa-20050406-sshhttp.nasl)

Bugtraq ID: 13042
13043

CVE ID: CVE-2005-1020
CVE-2005-1021