Cisco IOS LLDP Request Processing DoS

medium Nessus Plugin ID 74147

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported IOS version, the remote device may be affected by a denial of service vulnerability related to incorrect handling of malformed Link Layer Discovery Protocol (LLDP) packets. An adjacent, unauthenticated attacker could exploit this issue by sending malformed packets, causing a device reload.

Note that a successful attack requires that Channel Interface Processor (CIP) is enabled.

Solution

Upgrade to one of the non-vulnerable versions listed in the bug details for CSCum96282.

See Also

https://tools.cisco.com/security/center/viewAlert.x?alertId=34293

http://www.nessus.org/u?221007ad

Plugin Details

Severity: Medium

ID: 74147

File Name: cisco_ios_CSCum96282.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 5/23/2014

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/20/2014

Vulnerability Publication Date: 5/20/2014

Reference Information

CVE: CVE-2014-3273

BID: 67489

CISCO-BUG-ID: CSCum96282