Vulnerabilities > CVE-2001-0750 - Unspecified vulnerability in Cisco IOS 12.1(2)T/12.1(3)T
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Cisco IOS 12.1(2)T, 12.1(3)T allow remote attackers to cause a denial of service (reload) via a connection to TCP ports 3100-3999, 5100-5999, 7100-7999 and 10100-10999.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 |
Nessus
NASL family CISCO NASL id CISCO-SA-20010524-IOS-TCP-SCANNER-RELOADHTTP.NASL description Security Scanning software can cause a memory error in Cisco IOS Software that will cause a reload to occur. This vulnerability affects only Cisco IOS software version 12.1(2)T and 12.1(3)T, and limited deployment releases based on those versions. Customers using the affected Cisco IOS software releases are urged to upgrade as soon as possible to later versions that are not vulnerable to this defect. Vulnerable products and releases are listed in detail below. The security scanner makes TCP connection attempts to various ports, looking for open ports to further investigate known vulnerabilities with those services associated with certain ports. However, a side effect of the tests exposes the defect described in this security advisory, and the router will reload unexpectedly as soon as it receives a request to review or write the configuration file. This defect is documented as Cisco Bug ID CSCds07326. last seen 2020-06-01 modified 2020-06-02 plugin id 48955 published 2010-09-01 reporter This script is (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/48955 title IOS Reload after Scanning Vulnerability - Cisco Systems code # # (C) Tenable Network Security, Inc. # # Security advisory is (C) CISCO, Inc. # See https://www.cisco.com/en/US/products/products_security_advisory09186a00800b13b2.shtml if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(48955); script_version("1.11"); script_cve_id("CVE-2001-0750"); script_bugtraq_id(2804); script_xref(name:"CERT", value:"178024"); script_xref(name:"CISCO-BUG-ID", value:"CSCds07326"); script_xref(name:"CISCO-SA", value:"cisco-sa-20010524-ios-tcp-scanner-reload"); script_name(english:"IOS Reload after Scanning Vulnerability - Cisco Systems"); script_set_attribute(attribute:"synopsis", value: "The remote device is missing a vendor-supplied security patch" ); script_set_attribute(attribute:"description", value: 'Security Scanning software can cause a memory error in Cisco IOS Software that will cause a reload to occur. This vulnerability affects only Cisco IOS software version 12.1(2)T and 12.1(3)T, and limited deployment releases based on those versions. Customers using the affected Cisco IOS software releases are urged to upgrade as soon as possible to later versions that are not vulnerable to this defect. Vulnerable products and releases are listed in detail below. The security scanner makes TCP connection attempts to various ports, looking for open ports to further investigate known vulnerabilities with those services associated with certain ports. However, a side effect of the tests exposes the defect described in this security advisory, and the router will reload unexpectedly as soon as it receives a request to review or write the configuration file. This defect is documented as Cisco Bug ID CSCds07326. '); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20010524-ios-tcp-scanner-reload script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?34c1a8f9"); # https://www.cisco.com/en/US/products/products_security_advisory09186a00800b13b2.shtml script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?a4d7793b"); script_set_attribute(attribute:"solution", value: "Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20010524-ios-tcp-scanner-reload."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value: "local"); script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios"); script_set_attribute(attribute:"vuln_publication_date", value: "2001/05/24"); script_set_attribute(attribute:"patch_publication_date", value: "2001/05/24"); script_set_attribute(attribute:"plugin_publication_date", value: "2010/09/01"); script_cvs_date("Date: 2018/11/15 20:50:20"); script_end_attributes(); script_summary(english:"Uses SNMP to determine if a flaw is present"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("cisco_ios_version.nasl"); script_require_keys("Host/Cisco/IOS/Version"); exit(0); } include("cisco_func.inc"); # version = get_kb_item_or_exit("Host/Cisco/IOS/Version"); # Affected: 12.1DB if (check_release(version: version, patched: make_list("12.1(4)DB") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.1DC if (check_release(version: version, patched: make_list("12.1(4)DC") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.1T if (check_release(version: version, patched: make_list("12.1(4.3)T"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.1XB if (deprecated_version(version, "12.1XB")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XC if (deprecated_version(version, "12.1XC")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XE if (deprecated_version(version, "12.1XE")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XF if (deprecated_version(version, "12.1XF")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XG if (deprecated_version(version, "12.1XG")) { security_warning(port:0, extra: '\nUpdate to 12.2T or later\n'); exit(0); } # Affected: 12.1XH if (deprecated_version(version, "12.1XH")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XI if (deprecated_version(version, "12.1XI")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XJ if (deprecated_version(version, "12.1XJ")) { security_warning(port:0, extra: '\nUpdate to 12.2T or later\n'); exit(0); } # Affected: 12.1XK if (deprecated_version(version, "12.1XK")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XL if (deprecated_version(version, "12.1XL")) { security_warning(port:0, extra: '\nUpdate to 12.2(1) or later\n'); exit(0); } # Affected: 12.1XP if (deprecated_version(version, "12.1XP")) { security_warning(port:0, extra: '\nUpdate to 12.2T or later\n'); exit(0); } # Affected: 12.1XQ if (deprecated_version(version, "12.1XQ")) { security_warning(port:0, extra: '\nUpdate to 12.2T or later\n'); exit(0); } # Affected: 12.1XS if (check_release(version: version, patched: make_list("12.1(5)XS") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.1XT if (deprecated_version(version, "12.1XT")) { security_warning(port:0, extra: '\nUpdate to 12.2T or later\n'); exit(0); } exit(0, "The remote host is not affected");
NASL family CISCO NASL id CSCDS07326.NASL description Some security scanners can force a Cisco device to reload. An attacker may use this flaw to prevent your network from working properly. This vulnerability is documented as Cisco Bug ID CSCds07326. last seen 2020-06-01 modified 2020-06-02 plugin id 10977 published 2002-06-05 reporter This script is (C) 2002-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10977 title Cisco IOS Port Scan Remote DoS (CSCds07326) code # # (C) Tenable Network Security, Inc. # # Script audit and contributions from Carmichael Security # Erik Anderson <[email protected]> (nb: domain no longer exists) # Added BugtraqID and CVE # include("compat.inc"); if(description) { script_id(10977); script_version("1.22"); script_cve_id("CVE-2001-0750"); script_bugtraq_id(2804); script_name(english:"Cisco IOS Port Scan Remote DoS (CSCds07326)"); script_set_attribute(attribute:"synopsis", value: "The remote device is missing a vendor-supplied security patch" ); script_set_attribute(attribute:"description", value: "Some security scanners can force a Cisco device to reload. An attacker may use this flaw to prevent your network from working properly. This vulnerability is documented as Cisco Bug ID CSCds07326." ); script_set_attribute(attribute:"solution", value: "http://www.nessus.org/u?3794b3d8" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2002/06/05"); script_cvs_date("Date: 2018/06/27 18:42:25"); script_set_attribute(attribute:"vuln_publication_date", value: "2001/05/24"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios"); script_end_attributes(); script_summary(english:"Uses SNMP to determine if a flaw is present"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is (C) 2002-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl"); script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model"); exit(0); } # The code starts here ok=0; os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0); hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0); # Check for the required hardware... #---------------------------------------------------------------- # ciscoIGS if(ereg(string:hardware, pattern:"^ciscoIGS$"))ok=1; # ciscoAGSplus if(ereg(string:hardware, pattern:"^ciscoAGSplus$"))ok=1; # cisco800 if(ereg(string:hardware, pattern:"^cisco80[0-9]$"))ok=1; # ciscoABR900 if(ereg(string:hardware, pattern:"^ciscoABR90[0-9]$"))ok=1; # cisco1000 if(ereg(string:hardware, pattern:"^cisco10[0-9][0-9]$"))ok=1; # cisco2500 if(ereg(string:hardware, pattern:"^cisco25[0-9][0-9]$"))ok=1; # cisco2600 if(ereg(string:hardware, pattern:"^cisco26[0-9][0-9]$"))ok=1; # cisco3000 if(ereg(string:hardware, pattern:"^cisco30[0-9][0-9]$"))ok=1; # cisco3600 if(ereg(string:hardware, pattern:"^cisco36[0-9][0-9]$"))ok=1; # cisco3800 if(ereg(string:hardware, pattern:"^cisco38[0-9][0-9]$"))ok=1; # cisco4000 if(ereg(string:hardware, pattern:"^cisco40[0-9][0-9]$"))ok=1; # cisco4500 if(ereg(string:hardware, pattern:"^cisco45[0-9][0-9]$"))ok=1; # cisco4700 if(ereg(string:hardware, pattern:"^cisco47[0-9][0-9]$"))ok=1; # ciscoAS5200 if(ereg(string:hardware, pattern:"^ciscoAS52[0-9][0-9]$"))ok=1; # ciscoAS5300 if(ereg(string:hardware, pattern:"^ciscoAS53[0-9][0-9]$"))ok=1; # ciscoAS5800 if(ereg(string:hardware, pattern:"^ciscoAS58[0-9][0-9]$"))ok=1; # cisco6400 if(ereg(string:hardware, pattern:"^cisco64[0-9][0-9]$"))ok=1; # cisco7000 if(ereg(string:hardware, pattern:"^cisco70[0-9][0-9]$"))ok=1; # cisco7200 if(ereg(string:hardware, pattern:"^cisco72[0-9][0-9]$"))ok=1; # ciscoUBR7200 if(ereg(string:hardware, pattern:"^ciscoUBR72[0-9][0-9]$"))ok=1; # cisco7500 if(ereg(string:hardware, pattern:"^cisco75[0-9][0-9]$"))ok=1; # cisco12000 if(ereg(string:hardware, pattern:"^cisco12[0-9][0-9][0-9]$"))ok=1; # catalyst2908xl if(ereg(string:hardware, pattern:"^catalyst2908xl$"))ok=1; # ciscoLS1010 if(ereg(string:hardware, pattern:"^ciscoLS101[0-9]$"))ok=1; if(!ok)exit(0); ok = 0; # Check for the required operating system... #---------------------------------------------------------------- # Is this IOS ? if(!egrep(pattern:".*(Internetwork Operating|IOS).*", string:os))exit(0); # 12.1DB if(egrep(string:os, pattern:"(12\.1\([0-3]\)|12\.1)DB[0-9]*,"))ok=1; # 12.1DC if(egrep(string:os, pattern:"(12\.1\([0-3]\)|12\.1)DC[0-9]*,"))ok=1; # 12.1T if(egrep(string:os, pattern:"(12\.1\([0-4]\)|12\.1)T[0-9]*,"))ok=1; # 12.1XB if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XB[0-9]*,"))ok=1; # 12.1XD if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XD[0-9]*,"))ok=1; # 12.1XE if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XE[0-9]*,"))ok=1; # 12.1XF if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XF[0-9]*,"))ok=1; # 12.1XG if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XG[0-9]*,"))ok=1; # 12.1XH if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XH[0-9]*,"))ok=1; # 12.1XI if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XI[0-9]*,"))ok=1; # 12.1XJ if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XJ[0-9]*,"))ok=1; # 12.1XH if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XH[0-9]*,"))ok=1; # 12.1XI if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XI[0-9]*,"))ok=1; # 12.1XJ if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XJ[0-9]*,"))ok=1; # 12.1XK if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XK[0-9]*,"))ok=1; # 12.1XL if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XL[0-9]*,"))ok=1; # 12.1XP if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XP[0-9]*,"))ok=1; # 12.1XQ if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XQ[0-9]*,"))ok=1; # 12.1XS if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XS[0-9]*,"))ok=1; # 12.1XT if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)XT[0-9]*,"))ok=1; #---------------------------------------------- if(ok)security_warning(port:161, proto:"udp");