IPv6 Crafted Packet Vulnerability

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Cisco Internetwork Operating System (IOS) Software is vulnerable to a
denial of service (DoS) and potentially an arbitrary code execution
attack from a specially crafted IPv6 packet. The packet must be sent
from a local network segment. Only devices that have been explicitly
configured to process IPv6 traffic are affected. Upon successful
exploitation, the device may reload or be open to further exploitation.
Cisco has made free software available to address this vulnerability
for all affected customers.

See also :

http://www.nessus.org/u?e875e1f4
http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html
http://www.nessus.org/u?f9362391
http://www.nessus.org/u?b371f80f

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20050729-ipv6.

Risk factor :

High / CVSS Base Score : 8.3
(CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:F/RL:W/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 48987 (cisco-sa-20050729-ipv6.nasl)

Bugtraq ID: 14414

CVE ID: CVE-2005-2451