Cisco IOS LLDP Request Processing DoS

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported IOS version, the remote device may be
affected by a denial of service vulnerability related to incorrect
handling of malformed Link Layer Discovery Protocol (LLDP) packets. An
adjacent, unauthenticated attacker could exploit this issue by sending
malformed packets, causing a device reload.

Note that a successful attack requires that Channel Interface
Processor (CIP) is enabled.

See also :

http://tools.cisco.com/security/center/viewAlert.x?alertId=34293
http://www.nessus.org/u?5348702c

Solution :

Upgrade to one of the non-vulnerable versions listed in the bug
details for CSCum96282.

Risk factor :

Medium / CVSS Base Score : 6.1
(CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 74147 ()

Bugtraq ID: 67489

CVE ID: CVE-2014-3273