Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)

high Nessus Plugin ID 49052

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

A device running Cisco IOS Software, Cisco IOS XE Software, or Cisco IOS XR Software is vulnerable to a remote denial of service (DoS) condition if it is configured for Multiprotocol Label Switching (MPLS) and has support for Label Distribution Protocol (LDP). A crafted LDP UDP packet can cause an affected device running Cisco IOS Software or Cisco IOS XE Software to reload. On devices running affected versions of Cisco IOS XR Software, such packets can cause the device to restart the mpls_ldp process. A system is vulnerable if configured with either LDP or Tag Distribution Protocol (TDP). Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20100324-ldp.

See Also

http://www.nessus.org/u?1d8fad9b

Plugin Details

Severity: High

ID: 49052

File Name: cisco-sa-20100324-ldphttp.nasl

Version: 1.21

Type: combined

Family: CISCO

Published: 9/1/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Patch Publication Date: 9/21/2012

Vulnerability Publication Date: 3/24/2010

Reference Information

CVE: CVE-2010-0576

CISCO-SA: cisco-sa-20100324-ldp

CISCO-BUG-ID: CSCsz45567