Crafted Packet Causes Reload on Cisco Routers

This script is (C) 2010-2014 Tenable Network Security, Inc.

Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Cisco Routers running Internetwork Operating System (IOS) that supports
Multi Protocol Label Switching (MPLS) are vulnerable to a Denial of
Service (DoS) attack on interfaces where MPLS is not configured. A
system that supports MPLS is vulnerable even if that system is not
configured for MPLS.
The vulnerability is only present in Cisco IOS release trains based on
12.1T, 12.2, 12.2T, 12.3 and 12.3T. Releases based on 12.1 mainline,
12.1E and all releases prior to 12.1 are not vulnerable.
Cisco has made free software available to address this vulnerability.
There are workarounds available to mitigate the effects.

See also :

Solution :

Apply the relevant patch referenced in Cisco Security Advisory

Risk factor :

Medium / CVSS Base Score : 6.1
CVSS Temporal Score : 4.9
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 48982 (cisco-sa-20050126-leshttp.nasl)

Bugtraq ID: 12369

CVE ID: CVE-2005-0197

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now