Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A device running Cisco IOS Software, Cisco IOS XE Software, or Cisco
IOS XR Software is vulnerable to a remote denial of service (DoS)
condition if it is configured for Multiprotocol Label Switching (MPLS)
and has support for Label Distribution Protocol (LDP). A crafted LDP
UDP packet can cause an affected device running Cisco IOS Software or
Cisco IOS XE Software to reload. On devices running affected versions
of Cisco IOS XR Software, such packets can cause the device to restart
the mpls_ldp process. A system is vulnerable if configured with either
LDP or Tag Distribution Protocol (TDP). Cisco has released free
software updates that address this vulnerability. Workarounds that
mitigate this vulnerability are available.

See also :

http://www.nessus.org/u?21b419a1

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20100324-ldp.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Family: CISCO

Nessus Plugin ID: 49052 (cisco-sa-20100324-ldphttp.nasl)

Bugtraq ID:

CVE ID: CVE-2010-0576