This script is (C) 2010-2014 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
Multiple Cisco products are affected by denial of service (DoS)
vulnerabilities that manipulate the state of Transmission Control
Protocol (TCP) connections. By manipulating the state of a TCP
connection, an attacker could force the TCP connection to remain in a
long-lived state, possibly indefinitely. If enough TCP connections are
forced into a long-lived or indefinite state, resources on a system
under attack may be consumed, preventing new TCP connections from being
accepted. In some cases, a system reboot may be necessary to recover
normal system operation. To exploit these vulnerabilities, an attacker
must be able to complete a TCP three-way handshake with a vulnerable
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain
a TCP DoS vulnerability that may result in a system crash. This
additional vulnerability was found as a result of testing the TCP state
Cisco has released free software updates for download from the Cisco
website that address these vulnerabilities. Workarounds that mitigate
these vulnerabilities are available.
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.4
Public Exploit Available : true
Nessus Plugin ID: 49038 (cisco-sa-20090908-tcp24http.nasl)
Bugtraq ID: 3154536303
CVE ID: CVE-2008-4609CVE-2009-0627
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.