Vulnerabilities > CVE-2002-1103 - Unspecified vulnerability in Cisco products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
nessus

Summary

Cisco VPN 3000 Concentrator 2.2.x, 3.6(Rel), and 3.x before 3.5.5, allows remote attackers to cause a denial of service via (1) malformed or (2) large ISAKMP packets.

Nessus

NASL familyCISCO
NASL idCSCDY38035.NASL
descriptionAccording to its banner, the remote VPN concentrator is subject to an ISAKMP package processing vulnerability. Malformed or a very large number of ISAKMP packets might cause a reload of the concentrator. The vulnerability is aggravated if debug is turned on. This vulnerability is documented as Cisco bug ID CSCdy38035.
last seen2020-06-01
modified2020-06-02
plugin id11297
published2003-03-01
reporterThis script is (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11297
titleCisco VPN 3000 Concentrator Malformed ISAKMP Packet Remote DoS (CSCdy38035)
code
#
# (C) Tenable Network Security, Inc.
#
# Thanks to Nicolas FISCHBACH ([email protected]) for his help
#
# Ref:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020903-vpn3k-vulnerability



include("compat.inc");

if(description)
{
 script_id(11297);
 script_version("1.18");
 script_cvs_date("Date: 2018/11/15 20:50:20");
 script_cve_id("CVE-2002-1103");

 script_name(english:"Cisco VPN 3000 Concentrator Malformed ISAKMP Packet Remote DoS (CSCdy38035)");

 script_set_attribute(attribute:"synopsis", value:
"The remote VPN concentrator is affected by ISAKMP package processing
vulnerability." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the remote VPN concentrator is subject to an 
ISAKMP package processing vulnerability. Malformed or a very large 
number of ISAKMP packets might cause a reload of the concentrator. The 
vulnerability is aggravated if debug is turned on. This vulnerability 
is documented as Cisco bug ID CSCdy38035." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2702929c" );
 script_set_attribute(attribute:"solution", value:
"Apply vendor-supplied patches." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/03/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/09/03");
script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
script_end_attributes();


 summary["english"] = "Uses SNMP to determine if a flaw is present";
 script_summary(english:summary["english"]);

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is (C) 2003-2018 Tenable Network Security, Inc.");

 script_family(english:"CISCO");

 script_dependencie("snmp_sysDesc.nasl");
 script_require_keys("SNMP/community",
			  "SNMP/sysDesc",
			  "CISCO/model");
 
 exit(0);
}


# The code starts here
ok=0;

os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);


# Is this a VPN3k concentrator ?
if(!egrep(pattern:".*VPN 3000 Concentrator.*", string:os))exit(0);

# 3.6(Rel)
if(egrep(pattern:".*Version 3\.6\.Rel.*", string:os))ok = 1;

# < 3.5.5
if(egrep(pattern:".*Version 3\.5\.Rel.*", string:os))ok = 1;
if(egrep(pattern:".*Version 3\.5\.[0-4][^0-9].*", string:os))ok = 1;

# 3.1.x
if(egrep(pattern:".*Version 3\.1\..*", string:os))ok = 1;

# 3.0.x
if(egrep(pattern:".*Version 3\.0\..*", string:os))ok = 1;

# 2.x.x
if(egrep(pattern:".*Version 2\..*", string:os))ok = 1;


if(ok)security_warning(port:161, proto:"udp");