How to Buy
This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
Cisco IOS XR Software Releases 3.3.0 to 4.2.0 contain a vulnerability
when handling fragmented packets that could result in a denial of
service (DoS) condition of the Cisco CRS Route Processor cards listed in
the 'Affected Products' section of this advisory. The vulnerability is
due to improper handling of fragmented packets. The vulnerability could
cause the route processor, which processes the packets, to be unable to
transmit packets to the fabric. Customers that are running version
4.2.1 or later of Cisco IOS XR Software, or that have previously
installed the Software Maintenance Upgrades (SMU) for Cisco bug ID
CSCtz62593 are not affected by this vulnerability. Cisco has released
free software updates that address this vulnerability.
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 71438 ()
Bugtraq ID: 63298
CVE ID: CVE-2013-5549
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.