Arista Networks EOS/vEOS IP fragment DoS (SA0037)

high Nessus Plugin ID 133862

Synopsis

The version of Arista Networks EOS running on the remote device is affected by a denial of service vulnerability.

Description

The version of Arista Networks EOS running on the remote device is affected by a denial of service (DoS) vulnerability.
The Linux kernel is vulnerable to a DoS attack with low rates of specially modified packets targeting IP fragment re-assembly. An remote, unauthenticated attacker can cause a DoS condition by sending specially crafted IP fragments.
This vulnerability is caused by the increase of the IP fragment reassembly queue size in the Linux kernel.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Arista Networks EOS version 4.21.2.3F / 4.20.9M / 4.21.1F or later. Alternatively, apply the patch referenced in the vendor advisory.

See Also

http://www.nessus.org/u?5c910c33

Plugin Details

Severity: High

ID: 133862

File Name: arista_eos_sa0037.nasl

Version: 1.4

Type: combined

Family: Misc.

Published: 2/24/2020

Updated: 2/25/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-5391

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:arista:eos

Required KB Items: Host/Arista-EOS/Version, Host/Arista-EOS/model

Exploit Ease: No known exploits are available

Patch Publication Date: 8/14/2018

Vulnerability Publication Date: 8/14/2018

Reference Information

CVE: CVE-2018-5391