Vulnerabilities > CVE-2002-2208

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Extended Interior Gateway Routing Protocol (EIGRP), as implemented in Cisco IOS 11.3 through 12.2 and other products, allows remote attackers to cause a denial of service (flood) by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network.

Nessus

NASL familyCISCO
NASL idCISCO-SR-20051220-EIGRP.NASL
descriptionOn December 20 2005, Cisco released a security response for several vulnerabilities in the EIGRP implementation in IOS. Exploitation of these vulnerabilities could result in a denial of service via ARP flooding. This plugin checks if the appropriate fix for the advisory has been installed.
last seen2020-06-01
modified2020-06-02
plugin id17788
published2012-01-10
reporterThis script is (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17788
titleCisco EIGRP Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(17788);
 script_version("1.7");
 script_cvs_date("Date: 2018/11/15 20:50:20");

 script_cve_id("CVE-2002-2208");
 script_bugtraq_id(6443);
 script_xref(name:"CISCO-BUG-ID", value:"CSCsc13698");
 script_xref(name:"CISCO-BUG-ID", value:"CSCsc13724");
 script_xref(name:"CISCO-SR", value:"cisco-sr-20051220-eigrp");

 script_name(english:"Cisco EIGRP Multiple Vulnerabilities");
 script_summary(english:"Checks the version of Cisco IOS.");

 script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
 script_set_attribute(attribute:"description", value:
"On December 20 2005, Cisco released a security response for several
vulnerabilities in the EIGRP implementation in IOS. Exploitation of
these vulnerabilities could result in a denial of service via ARP
flooding. This plugin checks if the appropriate fix for the advisory
has been installed.");
 # https://www.cisco.com/c/en/us/support/web/field-notice-overview.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?44e94cb9");
 # https://web.archive.org/web/20130103085342/http://www.cisco.com/en/US/docs/ios/12_0/np1/configuration/guide/1ceigrp.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?bac57393");
 # https://www.cisco.com/en/US/tech/tk365/technologies_security_notice09186a008011c5e1.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?5ae6a14c");
 # http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?1b8ae5b5");
 # https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?3b4c3b97");
 # https://web.archive.org/web/20120508050313/http://www.cisco.com/en/US/docs/ios/12_3/12_3x/12_3xa/gt_802_1.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?c51e38ab");
 # https://web.archive.org/web/20121103030857/http://www.cisco.com/en/US/docs/ios/12_3t/ip_route/command/reference/ip2_i1gt.html
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?576186d2");
 script_set_attribute(attribute:"solution", value:"Upgrade to 12.0(6.3)PI, 12.0(6.3)T, 12.0(6.3)XE1, 12.0(7)T or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2002/12/19");
 script_set_attribute(attribute:"patch_publication_date", value:"2002/12/19");
 script_set_attribute(attribute:"plugin_publication_date", value:"2012/01/10");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is (C) 2012-2018 Tenable Network Security, Inc.");
 script_family(english:"CISCO");

 script_dependencie("cisco_ios_version.nasl");
 script_require_keys("Host/Cisco/IOS/Version");
 exit(0);
}

include("cisco_func.inc");

version = get_kb_item_or_exit("Host/Cisco/IOS/Version");

# Affected: 12.0PI
if (check_release(version: version,
                  patched: make_list("12.0(6.3)PI") ))
{
  security_hole(port:0, extra:'\nUpdate to ' + patch_update + ' or later.\n'); 
  exit(0);
}
# Affected: 12.0T
if (check_release(version: version,
                  patched: make_list("12.0(6.3)T") ))
{
  security_hole(port:0, extra:'\nUpdate to ' + patch_update + ' or later.\n'); 
  exit(0);
}
# Affected: 12.0XE1
if (check_release(version: version,
                  patched: make_list("12.0(6.3)XE1") ))
{
  security_hole(port:0, extra:'\nUpdate to ' + patch_update + ' or later.\n'); 
  exit(0);
}
# Affected: 12.0T
if (check_release(version: version,
                  patched: make_list("12.0(7)T") ))
{
  security_hole(port:0, extra:'\nUpdate to ' + patch_update + ' or later.\n'); 
  exit(0);
}
exit(0, "The host is not affected.");