Vulnerability in Cisco IOS While Processing SSL Packet - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A Cisco IOS device may crash while processing an SSL packet. This can
happen during the termination of an SSL-based session. The offending
packet is not malformed and is normally received as part of the packet
exchange.
Cisco has released free software updates that address this
vulnerability. Aside from disabling affected services, there are no
available workarounds to mitigate an exploit of this vulnerability.

See also :

http://www.nessus.org/u?688f60b8
http://www.nessus.org/u?e17b5a90

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20080924-ssl.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 49026 (cisco-sa-20080924-sslhttp.nasl)

Bugtraq ID: 31365

CVE ID: CVE-2008-3798