Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)

high Nessus Plugin ID 70322

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

A vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of multicast NTP packets that are sent to an affected device encapsulated in a Multicast Source Discovery Protocol (MSDP) Source-Active (SA) message from a configured MSDP peer. An attacker could exploit this vulnerability by sending multicast NTP packets to an affected device. Repeated exploitation could result in a sustained DoS condition. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20130925-ntp.

See Also

http://www.nessus.org/u?0c1eb72e

Plugin Details

Severity: High

ID: 70322

File Name: cisco-sa-20130925-ntp.nasl

Version: 1.14

Type: combined

Family: CISCO

Published: 10/7/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/25/2013

Vulnerability Publication Date: 9/25/2013

Reference Information

CVE: CVE-2013-5472

BID: 62640

CISCO-SA: cisco-sa-20130925-ntp

CISCO-BUG-ID: CSCuc81226