Cisco IOS Malformed BGP Packet Causes Reload - Cisco Systems

This script is (C) 2010-2014 Tenable Network Security, Inc.

Synopsis :

The remote device is missing a vendor-supplied security patch

Description :

A Cisco device running IOS and enabled for the Border Gateway Protocol
(BGP) is vulnerable to a Denial of Service (DOS) attack from a
malformed BGP packet. The BGP protocol is not enabled by default, and
must be configured in order to accept traffic from an explicitly
defined peer. Unless the malicious traffic appears to be sourced from a
configured, trusted peer, it would be difficult to inject a malformed
Cisco has made free software available to address this problem.

See also :

Solution :

Apply the relevant patch referenced in Cisco Security Advisory

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.0
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48975 (cisco-sa-20040616-bgphttp.nasl)

Bugtraq ID: 10560

CVE ID: CVE-2004-0589

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now