Cisco IOS OSPF Packet Handling DoS (CSCec16481)

medium Nessus Plugin ID 14337

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The target is a Cisco device running a version of IOS that is vulnerable to a DoS attack from a malformed OSPF packet. Given knowledge of OSPF area number, netmask, hello, and dead timers that are configured on the targeted interface, a remote attacker can send a malformed OSPF packet and cause the device to be reset, which may take several minutes. Note, though, that the OSPF protocol is not enabled by default.

This vulnerability is documented as Cisco Bug ID CSCec16481.

Solution

http://www.nessus.org/u?fefa1e85

Plugin Details

Severity: Medium

ID: 14337

File Name: CSCec16481.nasl

Version: 1.21

Type: local

Family: CISCO

Published: 8/22/2004

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/community, SNMP/sysDesc, CISCO/model

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/18/2004

Reference Information

CVE: CVE-2004-1454

BID: 10971