发布时间 :2001-12-06 00:00:00
修订时间 :2017-10-09 21:29:54

[原文]Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not handle the "fragment" keyword in a compiled ACL (Turbo ACL) for packets that are sent to the router, which allows remote attackers to cause a denial of service via a flood of fragments.

[CNNVD]Cisco Fragment关键字传出访问控制漏洞(CNNVD-200112-073)

        带有基于Engine 2的IOS 12.0和line cards的Cisco 12000未处理发送至路由的数据包已编译ACL(Turbo ACL)中的“fragment”关键字,远程攻击者可以借助大量fragment导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5541Cisco Fragment Outgoing Fragment Access Control Vulnerability

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  CISCO  20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router
(UNKNOWN)  BID  3539
(UNKNOWN)  XF  cisco-acl-outgoing-fragment(7551)

- 漏洞信息

Cisco Fragment关键字传出访问控制漏洞
中危 设计错误
2001-12-06 00:00:00 2005-10-12 00:00:00
        带有基于Engine 2的IOS 12.0和line cards的Cisco 12000未处理发送至路由的数据包已编译ACL(Turbo ACL)中的“fragment”关键字,远程攻击者可以借助大量fragment导致服务拒绝。

- 公告与补丁

        Cisco has released upgrades which address this issue.
        Cisco IOS 12.0 S

  •         Cisco IOS 12.0(19)S


        Cisco IOS 12.0 ST

  •         Cisco IOS 12.0(18.6)ST1


- 漏洞信息

Cisco 12000 Series Router Fragment Keyword Ignored in Outbound ACL

- 漏洞描述

Cisco IOS on 12000 series routers contains a flaw that may allow a malicious user to bypass access control lists. The issue is triggered by lack of support for the "fragment" keyword by outbound ACLs. It is possible that the flaw may allow unauthorized traffic to traverse the network.

- 时间线

2001-11-14 2001-11-14
Unknow Unknow

- 解决方案

Upgrade to version indicated in Cisco product matrix, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete