Cisco 6000/6500/7600 Crafted Layer 2 Frame Vulnerability - Cisco Systems

medium Nessus Plugin ID 48973

Language:

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A layer 2 frame (as defined in the Open System Interconnection Reference Model) that is encapsulating a layer 3 packet (IP, IPX, etc.) may cause Cisco 6000/6500/7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) that have a FlexWAN or Optical Services Module (OSM) or that run 12.1(8b)E14 to freeze or reset, if the actual length of this frame is inconsistent with the length of the encapsulated layer 3 packet.
This vulnerability may be exploited repeatedly causing a denial of service.
This vulnerability has been addressed by the Cisco Bug IDs CSCdy15598 and CSCeb56052.
There is no workaround available. A software upgrade is needed to address the vulnerability.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20040203-cat6k.

See Also

http://www.nessus.org/u?7a7aa89a

http://www.nessus.org/u?89a5ecaa

Plugin Details

Severity: Medium

ID: 48973

File Name: cisco-sa-20040203-cat6k.nasl

Version: 1.15

Type: local

Family: CISCO

Published: 9/1/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/3/2004

Vulnerability Publication Date: 2/3/2004

Reference Information

CVE: CVE-2004-0244

BID: 9562

CWE: 20

CISCO-SA: cisco-sa-20040203-cat6k

CISCO-BUG-ID: CSCdy15598, CSCeb56052