Vulnerabilities > CVE-2003-0100 - Unspecified vulnerability in Cisco IOS

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
nessus
exploit available

Summary

Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements.

Vulnerable Configurations

Part Description Count
OS
Cisco
221

Exploit-Db

descriptionCisco IOS 11/12 OSPF Neighbor Buffer Overflow Vulnerability. CVE-2003-0100. Remote exploit for hardware platform
idEDB-ID:22271
last seen2016-02-02
modified2003-02-20
published2003-02-20
reporterFX
sourcehttps://www.exploit-db.com/download/22271/
titleCisco IOS 11/12 OSPF Neighbor Buffer Overflow Vulnerability

Nessus

NASL familyCISCO
NASL idCSCDP58462.NASL
descriptionThe Open Shortest Path First (OSPF) implementation in remote Cisco IOS software versions is vulnerable to a denial of service if it receives a flood of neighbor announcements in which more than 255 hosts try to establish a neighbor relationship per interface. An attacker may use this flaw to prevent your router from working properly This vulnerability is documented as Cisco Bug ID CSCdp58462.
last seen2020-03-28
modified2003-02-28
plugin id11283
published2003-02-28
reporterThis script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11283
titleCisco IOS OSPF Neighbor Announcement Remote Overflow (CSCdp58462)
code
#
# (C) Tenable Network Security, Inc.
#

# References:
#
# From: FX <[email protected]>
# To: [email protected], [email protected]
# Subject: Cisco IOS OSPF exploit
# Message-ID: <[email protected]>
#
#
# From: Mike Caudill <[email protected]>
# Message-Id: <[email protected]> 
# Subject: Re: Cisco IOS OSPF exploit 
#
# http://www.nessus.org/u?b37db228
#


include("compat.inc");

if(description)
{
 script_id(11283);
 script_version("1.22");
 script_cve_id("CVE-2003-0100");
 script_bugtraq_id(6895);

 script_name(english:"Cisco IOS OSPF Neighbor Announcement Remote Overflow (CSCdp58462)");

 script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The Open Shortest Path First (OSPF) implementation in remote
Cisco IOS software versions is vulnerable to a denial of service
if it receives a flood of neighbor announcements in which more than
255 hosts try to establish a neighbor relationship per interface.

An attacker may use this flaw to prevent your router from working
properly

This vulnerability is documented as Cisco Bug ID CSCdp58462." );
 script_set_attribute(attribute:"solution", value:
"http://www.nessus.org/u?b37db228" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/02/28");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/02/20");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
 script_end_attributes();

 script_summary(english:"Uses SNMP to determine if a flaw is present");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"CISCO");
 script_dependencies("snmp_sysDesc.nasl", "snmp_cisco_type.nasl");
 script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model");
 exit(0);
}

# The code starts here

ok=0;
os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);
hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0);




# Check for the required operating system...
#----------------------------------------------------------------
# Is this IOS ?
if(!egrep(pattern:".*(Internetwork Operating|IOS).*", string:os))exit(0);
# 11.1
if(egrep(string:os, pattern:"(^|\s+)(11\.1\([0-9]*\)|11\.1),"))ok=1;

# 12.0S
if(egrep(string:os, pattern:"(^|\s+)(12\.0\(([0-9]|1[0-8])\)|12\.0)S[0-9]*,"))ok=1;

# 12.0ST
if(egrep(string:os, pattern:"(^|\s+)(12\.0\(([0-9]|1[0-8])\)|12\.0)ST[0-9]*,"))ok=1;

# 12.1
if(egrep(string:os, pattern:"(^|\s+)(12\.1\([0-1]\)|12\.1),"))ok=1;

# 12.1DB
if(egrep(string:os, pattern:"(^|\s+)(12\.1\([0-0]\)|12\.1)DB[0-9]*,"))ok=1;

# 12.1DC
if(egrep(string:os, pattern:"(^|\s+)(12\.1\([0-0]\)|12\.1)DC[0-9]*,"))ok=1;

# 12.1T
if(egrep(string:os, pattern:"(^|\s+)(12\.1\([0-0]\)|12\.1)T[0-9]*,"))ok=1;


#----------------------------------------------

if(ok)security_hole(port:161, proto:"udp");