Crafted IP Option Vulnerability

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Cisco routers and switches running Cisco IOS or Cisco IOS XR software
may be vulnerable to a remotely exploitable crafted IP option Denial of
Service (DoS) attack. Exploitation of the vulnerability may potentially
allow for arbitrary code execution. The vulnerability may be exploited
after processing an Internet Control Message Protocol (ICMP) packet,
Protocol Independent Multicast version 2 (PIMv2) packet, Pragmatic
General Multicast (PGM) packet, or URL Rendezvous Directory (URD)
packet containing a specific crafted IP option in the packet's IP
header. No other IP protocols are affected by this issue.
Cisco has made free software available to address this vulnerability
for affected customers.

See also :

http://www.nessus.org/u?cdec28c3

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20070124-crafted-ip-option.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: CISCO

Nessus Plugin ID: 48996 (cisco-sa-20070124-crafted-ip-optionhttp.nasl)

Bugtraq ID:

CVE ID: CVE-2007-0480

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial