Multiple Crafted IPv6 Packets Cause Reload

high Nessus Plugin ID 48981

Language:

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Cisco Internetwork Operating System (IOS) Software is vulnerable to a Denial of Service (DoS) attack from crafted IPv6 packets when the device has been configured to process IPv6 traffic. This vulnerability requires multiple crafted packets to be sent to the device which may result in a reload upon successful exploitation.

Cisco has made free software available to address this vulnerability.
There are workarounds available to mitigate the effects.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20050126-ipv6.

See Also

http://www.nessus.org/u?881a9652

http://www.nessus.org/u?c59f7ef2

Plugin Details

Severity: High

ID: 48981

File Name: cisco-sa-20050126-ipv6http.nasl

Version: 1.18

Type: local

Family: CISCO

Published: 9/1/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/26/2005

Vulnerability Publication Date: 1/26/2005

Reference Information

CVE: CVE-2005-0195

BID: 12368

CERT: 472582

CISCO-SA: cisco-sa-20050126-ipv6

CISCO-BUG-ID: CSCed40933