Cisco IOS Malformed IPv4 Packet Remote DoS

high Nessus Plugin ID 11791

Synopsis

The remote network device has a denial of service vulnerability.

Description

According to its version number, the remote router or switch is running a vulnerable version of Cisco IOS. Sending a specific sequence of IPv4 packets can cause the input interface to stop accepting traffic.

Note that this vulnerability does not affect devices that only use IPv6.

Solution

Upgrade to the version of IOS referenced in the vendor's advisory.

See Also

http://www.nessus.org/u?09cf3fb4

Plugin Details

Severity: High

ID: 11791

File Name: cisco_ipv4_dos.nasl

Version: 1.29

Type: local

Family: CISCO

Published: 7/17/2003

Updated: 3/25/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2003-0567

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/community, SNMP/sysDesc

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/18/2003

Vulnerability Publication Date: 7/18/2003

Reference Information

CVE: CVE-2003-0567

BID: 8211

CWE: 20

CERT-CC: CA-2003-15