CVE-1999-0063
CVSS5.0
发布时间 :1999-01-11 00:00:00
修订时间 :2008-09-09 08:33:39
NMCOE    

[原文]Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.


[CNNVD]Cisco IOS syslog端口恶意UDP数据包破坏漏洞(CNNVD-199901-037)

        Cisco IOS 12.0和其他版本中存在漏洞。该漏洞造成的危害是:这些版本可被syslog端口的恶意UDP数据包破坏。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:ios:12.0%281%29wCisco IOS 12.0.1 W
cpe:/o:cisco:ios:11.3aaCisco IOS 11.3AA
cpe:/o:cisco:ios:12.0%282%29xdCisco IOS 12.0.2 XD
cpe:/o:cisco:ios:12.0sCisco IOS 12.0S
cpe:/o:cisco:ios:11.3dbCisco IOS 11.3DB
cpe:/o:cisco:ios:12.0%281%29xa3Cisco IOS 12.0.1 XA3
cpe:/o:cisco:ios:12.0Cisco IOS 12.0
cpe:/o:cisco:ios:12.0%282%29xcCisco IOS 12.0.2 XC
cpe:/o:cisco:ios:12.0%281%29xeCisco IOS 12.0.1 XE
cpe:/o:cisco:ios:12.0tCisco IOS 12.0T
cpe:/o:cisco:ios:12.0dbCisco IOS 12.0DB
cpe:/o:cisco:ios:12.0%281%29xbCisco IOS 12.0.1 XB

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5874Cisco IOS UDP 514 Denial of Service Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0063
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0063
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199901-037
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Cisco IOS syslog端口恶意UDP数据包破坏漏洞
中危 未知
1999-01-11 00:00:00 2005-05-02 00:00:00
远程  
        Cisco IOS 12.0和其他版本中存在漏洞。该漏洞造成的危害是:这些版本可被syslog端口的恶意UDP数据包破坏。

- 公告与补丁

        

- 漏洞信息 (19531)

Cisco IOS <= 12.0.2 Syslog Crash (EDBID:19531)
hardware remote
1999-01-11 Verified
0 Olaf Selke
N/A [点击下载]
source: http://www.securityfocus.com/bid/675/info

Cisco devices running classic IOS are reported prone to a denial of service vulnerability. The issue occurs when a vulnerable device receives and processes a UDP packet on UDP port 514 for syslog. This issue results in a crash or hang requiring a reboot.

Vulnerable IOS software may be found on the following Cisco devices:

- Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 8xx, ubr9xx, 1xxx, 25xx, 26xx, 30xx, 36xx, 38xx, 40xx, 45xx, 47xx, AS52xx, AS53xx, AS58xx, 64xx, 70xx, 72xx (including the ubr72xx), 75xx, and 12xxx series.
-Recent versions of LS1010 ATM switch.
-Catalyst 2900XL LAN switch.
-Cisco DitributedDirector. 

nmap -sU -p514 <IP-of-Cisco-device> 		

- 漏洞信息

1089
Cisco IOS Syslog Invalid UDP Packet DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

IOS contains a flaw that may allow a remote denial of service. The issue is triggered when an invalid UDP packet is sent to the syslog port, and will result in loss of availability for the platform.

- 时间线

1999-01-11 1998-12-22
Unknow Unknow

- 解决方案

Upgrade to version indicated by Cisco product matrix, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站