CVE-2005-0197
CVSS6.1
发布时间 :2005-05-02 00:00:00
修订时间 :2009-03-04 00:29:27
NMCOS    

[原文]Cisco IOS 12.1T, 12.2, 12.2T, 12.3 and 12.3T, with Multi Protocol Label Switching (MPLS) installed but disabled, allows remote attackers to cause a denial of service (device reload) via a crafted packet sent to the disabled interface.


[CNNVD]Cisco IOS畸形MPLS包远程拒绝服务漏洞(CNNVD-200505-484)

        Cisco IOS是运行于很多Cisco设备的操作系统。
        Cisco IOS设备在处理特殊MPLS包时存在问题,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 6.1 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: ADJACENT_NETWORK [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-16 [配置]

- CPE (受影响的平台与产品)

cpe:/o:cisco:ios:12.1tCisco IOS 12.1T
cpe:/o:cisco:ios:12.2Cisco IOS 12.2
cpe:/o:cisco:ios:12.3tCisco IOS 12.3T
cpe:/o:cisco:ios:12.2tCisco IOS 12.2T
cpe:/o:cisco:ios:12.3Cisco IOS 12.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5662Cisco IOS Routers MPLS Reset Denial of Service Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0197
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0197
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-484
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA05-026A.html
(VENDOR_ADVISORY)  CERT  TA05-026A
http://www.kb.cert.org/vuls/id/583638
(VENDOR_ADVISORY)  CERT-VN  VU#583638
http://xforce.iss.net/xforce/xfdb/19071
(VENDOR_ADVISORY)  XF  cisco-ios-mpls-dos(19071)
http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml
(VENDOR_ADVISORY)  CISCO  20050126 Crafted Packet Causes Reload on Cisco Routers
http://www.securityfocus.com/bid/12369
(UNKNOWN)  BID  12369
http://securitytracker.com/id?1013015
(UNKNOWN)  SECTRACK  1013015
http://secunia.com/advisories/14031
(UNKNOWN)  SECUNIA  14031

- 漏洞信息

Cisco IOS畸形MPLS包远程拒绝服务漏洞
中危 配置错误
2005-05-02 00:00:00 2009-03-04 00:00:00
远程  
        Cisco IOS是运行于很多Cisco设备的操作系统。
        Cisco IOS设备在处理特殊MPLS包时存在问题,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。

- 公告与补丁

        暂无数据

- 漏洞信息

13191
Cisco IOS Multi Protocol Label Switching (MPLS) Packet Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

Cisco IOS contains a flaw that may allow a remote denial of service. The issue is triggered when a certain Multi Protocol Label Switching (MPLS) packet is received, and will result in loss of availability for the platform.

- 时间线

2005-01-26 Unknow
Unknow Unknow

- 解决方案

The vendor has released upgrades to address this vulnerability. See the vendor's solution URL for available upgrades. It may also be possible to correct the flaw by enabling MPLS on all interfaces on the device.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco IOS Multi Protocol Label Switching Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 12369
Yes No
2005-01-26 12:00:00 2009-07-12 10:06:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

Cisco IOS 12.3YH
Cisco IOS 12.3YG
Cisco IOS 12.3YF
Cisco IOS 12.3YE
Cisco IOS 12.3YD
Cisco IOS 12.3YA
Cisco IOS 12.3XY
Cisco IOS 12.3XX
Cisco IOS 12.3XW
Cisco IOS 12.3XU
Cisco IOS 12.3XT
Cisco IOS 12.3XS
Cisco IOS 12.3XR
Cisco IOS 12.3XQ
Cisco IOS 12.3XN
Cisco IOS 12.3XM
Cisco IOS 12.3XL
Cisco IOS 12.3XK
Cisco IOS 12.3XJ
Cisco IOS 12.3XI
Cisco IOS 12.3XH
Cisco IOS 12.3XG
Cisco IOS 12.3XF
Cisco IOS 12.3XE
Cisco IOS 12.3XD
Cisco IOS 12.3XC
Cisco IOS 12.3XB
Cisco IOS 12.3XA
Cisco IOS 12.3T
Cisco IOS 12.3BW
Cisco IOS 12.3BC
Cisco IOS 12.3B
Cisco IOS 12.3
Cisco IOS 12.2ZP
Cisco IOS 12.2ZO
Cisco IOS 12.2ZN
Cisco IOS 12.2ZL
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZI
Cisco IOS 12.2ZH
Cisco IOS 12.2ZG
Cisco IOS 12.2ZF
Cisco IOS 12.2ZE
Cisco IOS 12.2ZD
Cisco IOS 12.2ZC
Cisco IOS 12.2ZB
Cisco IOS 12.2YZ
Cisco IOS 12.2YX
Cisco IOS 12.2YW
Cisco IOS 12.2YV
Cisco IOS 12.2YU
Cisco IOS 12.2YS
Cisco IOS 12.2YR
Cisco IOS 12.2YQ
Cisco IOS 12.2YO
Cisco IOS 12.2YN
Cisco IOS 12.2YM
Cisco IOS 12.2YL
Cisco IOS 12.2YJ
Cisco IOS 12.2YH
Cisco IOS 12.2YG
Cisco IOS 12.2YF
Cisco IOS 12.2YE
Cisco IOS 12.2YD
Cisco IOS 12.2YC
Cisco IOS 12.2YB
Cisco IOS 12.2YA
Cisco IOS 12.2XZ
Cisco IOS 12.2XW
Cisco IOS 12.2XV
Cisco IOS 12.2XU
Cisco IOS 12.2XT
Cisco IOS 12.2XS
Cisco IOS 12.2XR
Cisco IOS 12.2XQ
Cisco IOS 12.2XN
Cisco IOS 12.2XM
Cisco IOS 12.2XL
Cisco IOS 12.2XK
Cisco IOS 12.2XJ
Cisco IOS 12.2XI
Cisco IOS 12.2XH
Cisco IOS 12.2XG
Cisco IOS 12.2XF
Cisco IOS 12.2XE
Cisco IOS 12.2XD
Cisco IOS 12.2XC
Cisco IOS 12.2XB
Cisco IOS 12.2XA
Cisco IOS 12.2T
Cisco IOS 12.2SZ
Cisco IOS 12.2SY
Cisco IOS 12.2SXD
Cisco IOS 12.2SXB
Cisco IOS 12.2SXA
Cisco IOS 12.2SX
Cisco IOS 12.2SW
Cisco IOS 12.2SU
Cisco IOS 12.2S
Cisco IOS 12.2MX
Cisco IOS 12.2MC
Cisco IOS 12.2MB
Cisco IOS 12.2JK
Cisco IOS 12.2JA
Cisco IOS 12.2EWA
Cisco IOS 12.2EW
Cisco IOS 12.2DX
Cisco IOS 12.2DD
Cisco IOS 12.2DA
Cisco IOS 12.2CZ
Cisco IOS 12.2CY
Cisco IOS 12.2CX
Cisco IOS 12.2BZ
Cisco IOS 12.2BY
Cisco IOS 12.2BX
Cisco IOS 12.2BW
Cisco IOS 12.2BC
Cisco IOS 12.2B
Cisco IOS 12.1YI
Cisco IOS 12.1YH
Cisco IOS 12.1YF
Cisco IOS 12.1YE
Cisco IOS 12.1YD
Cisco IOS 12.1YC
Cisco IOS 12.1YB
Cisco IOS 12.1YA
Cisco IOS 12.1XV
Cisco IOS 12.1XU
Cisco IOS 12.1XT
Cisco IOS 12.1XR
Cisco IOS 12.1XQ
Cisco IOS 12.1XP
Cisco IOS 12.1XM
Cisco IOS 12.1XL
Cisco IOS 12.1XJ
Cisco IOS 12.1XI
Cisco IOS 12.1XG
Cisco IOS 12.1T
Cisco IOS 12.1DC
Cisco IOS 12.1DB

- 漏洞讨论

Cisco IOS based routers that are configured with support for Multi Protocol Label Switching (MPLS) are reported prone to a remote denial of service vulnerability.

It is reported that the vulnerability presents itself when an affected router handles an unspecified malicious packet on a MPLS disabled interface.

A remote attacker that resides on the same network segment as the vulnerable router may exploit this vulnerability continuously to effectively deny network-based services to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released an updated advisory (cisco-sa-20050126-les revision 1.1) and fixes to address this vulnerability. Customers are advised to peruse the referenced advisory for further information in regards to obtaining and applying appropriate updates.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站