Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability (cisco-sa-20130925-ipv6vfr)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A vulnerability in the implementation of the virtual fragmentation
reassembly (VFR) feature for IP version 6 (IPv6) in Cisco IOS Software
could allow an unauthenticated, remote attacker to cause an affected
device to hang or reload, resulting in a denial of service (DoS)
condition. The vulnerability is due to a race condition while
accessing the reassembly queue for IPv6 fragments. An attacker could
exploit this vulnerability by sending a crafted stream of valid IPv6
fragments. Repeated exploitation may result in a sustained DoS
condition. Cisco has released free software updates that address this
vulnerability. There are no workarounds for this vulnerability.

See also :

http://www.nessus.org/u?973c63a3

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20130925-ipv6vfr.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 70319 ()

Bugtraq ID: 62638

CVE ID: CVE-2013-5474