Cisco IOS XE Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A vulnerability in the implementation of the Network Time Protocol
(NTP) feature in Cisco IOS XE Software could allow an unauthenticated,
remote attacker to cause an affected device to reload, resulting in a
denial of service (DoS) condition. The vulnerability is due to the
improper handling of multicast NTP packets that are sent to an affected
device encapsulated in a Multicast Source Discovery Protocol (MSDP)
Source-Active (SA) message from a configured MSDP peer. An attacker
could exploit this vulnerability by sending multicast NTP packets to an
affected device. Repeated exploitation could result in a sustained DoS
condition. Cisco has released free software updates that address this
vulnerability. A workaround is available to mitigate this
vulnerability.

See also :

http://www.nessus.org/u?37c601ac

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20130925-ntp.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.2
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 70321 ()

Bugtraq ID: 62640

CVE ID: CVE-2013-5472