Vulnerabilities > CVE-2007-1258 - Unspecified vulnerability in Cisco products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 3 | |
OS | 5 |
Nessus
NASL family CISCO NASL id CSCEF90002.NASL description The remote host is a CISCO Catalyst 6500 switch containing a version of IOS that is affected by a denial of service vulnerability when processing malformed MPLS packets. An attacker may exploit this flaw to crash the remote device. last seen 2020-06-01 modified 2020-06-02 plugin id 24736 published 2007-03-01 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24736 title Cisco Catalyst Hybrid Mode Malformed MPLS Packet Remote DoS (CSCsd37415, CSCef90002) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if(description) { script_id(24736); script_version("1.19"); script_cve_id("CVE-2007-1258"); script_bugtraq_id(22750); script_name(english:"Cisco Catalyst Hybrid Mode Malformed MPLS Packet Remote DoS (CSCsd37415, CSCef90002)"); script_set_attribute(attribute:"synopsis", value: "The remote switch can be crashed remotely." ); script_set_attribute(attribute:"description", value: "The remote host is a CISCO Catalyst 6500 switch containing a version of IOS that is affected by a denial of service vulnerability when processing malformed MPLS packets. An attacker may exploit this flaw to crash the remote device." ); script_set_attribute(attribute:"solution", value: "http://www.nessus.org/u?0e6ad627" ); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2007/03/01"); script_set_attribute(attribute:"vuln_publication_date", value: "2007/02/28"); script_cvs_date("Date: 2018/06/27 18:42:25"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios"); script_end_attributes(); summary["english"] = "Uses SNMP to determine if a flaw is present"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl"); script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model"); exit(0); } include('cisco_func.inc'); os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0); if(!egrep(pattern:".*(Internetwork Operating|IOS).*", string:os)) exit(0); hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0); if(!ereg(string:hardware, pattern:"^cat6500.*$"))exit(0); version = extract_version(os); if ( ! version ) exit(0); if ( deprecated_version(version, "12.2SXA") ) vuln ++; if ( "SXB" >< version && check_release(version:version, patched:make_list("12.2(17d)SXB5"), newest:"12.2(17d)SXB5") ) vuln ++; if ( "SXB" >< version && check_release(version:version, patched:make_list("12.2(18)SXD3"), newest:"12.2(18)SXD3") ) vuln ++; if ( "SXF" >< version && check_release(version:version, patched:make_list("12.2(18)SXF5"), newest:"12.2(18)SXF5") ) vuln ++; if ( vuln == 1 ) security_warning(port:161, proto:"udp"); else if ( vuln > 1 ) display("IOS version ", version, " identified as vulnerable by multiple checks\n");
NASL family CISCO NASL id CISCO-SA-20070228-MPLSHTTP.NASL description Cisco Catalyst 6500 series systems that are running certain versions of Cisco Internetwork Operating System (IOS) are vulnerable to an attack from a Multi Protocol Label Switching (MPLS) packet. Only the systems that are running in Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the Multilayer Switch Feature Card (MSFC)) or running with Cisco IOS Software Modularity are affected. MPLS packets can only be sent from the local network segment. last seen 2019-10-28 modified 2010-09-01 plugin id 49001 published 2010-09-01 reporter This script is (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/49001 title Cisco Catalyst 6000, 6500 and Cisco 7600 Series MPLS Packet Vulnerability code #TRUSTED 892563a9b774d7a4ed33fd87d6288ad1afcd6f126a092df63913f05783e0276b9479a5c56b38eefd15a94ed25e78636332c551cdf1d26d5c2c4d3eca10d740c57aa0b51badcfacea745ff8dc600f756d26edf4c0f274e711d2368d0277a491343276178d298a859aaba6ca4ab1762ec8f870bf1990b1de6bd5998633a758772aa6f7866c94a42344ac06aa155cc32e36805e3336078efb7a73317e294e97063541eb13683b2dc5f65cc8a7d1ce6b26fd93e7050a1695566d0c1f7e3fdd0f103c87436582b60a7e63da5857212d0174d6098aa282f0e1756633aaf89abc895b3594f58ee80fd660bb965c6f16a492edbb42ca106612f9ede1edd68de06c97c9591df6a6d115528ccf1edfb6c290e71b6f9207dc9e96b97783486f7098b0d8248918433ae4a3084dc3035c11970697e40ffaa276c98bb76cfa41a597672090c95bb39ca9a5503d11064edfbbbe5ff369ffea5675c474d466251916a7417bd37004a314ed28e6018efba2ab2d6496b511c9cb8363b8326894f4b9e133e2034ea7e1312149a1240229412225c1e8b91a52dccd5617e01e335ab6c67315622495170c4badbea41c02ff616b3bdd777aeefd1d4b1ad307e0311b9e6b13e29f281449385da0f75ca794d61966a24adee888f3622eded180f9286e790f6b943e85cbbe44d0435f925b6638941b77842520c6a5030f729b2ae11770734d928b62a2bc7f63 # # (C) Tenable Network Security, Inc. # # Security advisory is (C) CISCO, Inc. # See https://www.cisco.com/en/US/products/products_security_advisory09186a00807f413e.shtml if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(49001); script_version("1.16"); script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15"); script_cve_id("CVE-2007-1258"); script_name(english:"Cisco Catalyst 6000, 6500 and Cisco 7600 Series MPLS Packet Vulnerability"); script_summary(english:"Checks the IOS version."); script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch."); script_set_attribute(attribute:"description", value: 'Cisco Catalyst 6500 series systems that are running certain versions of Cisco Internetwork Operating System (IOS) are vulnerable to an attack from a Multi Protocol Label Switching (MPLS) packet. Only the systems that are running in Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the Multilayer Switch Feature Card (MSFC)) or running with Cisco IOS Software Modularity are affected. MPLS packets can only be sent from the local network segment. '); script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?99a010c1"); # https://www.cisco.com/en/US/products/products_security_advisory09186a00807f413e.shtml script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?08e188df"); script_set_attribute(attribute:"solution", value: "Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20070228-mpls."); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/02/28"); script_set_attribute(attribute:"patch_publication_date", value:"2007/02/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01"); script_end_attributes(); script_xref(name:"CISCO-BUG-ID", value:"CSCef90002"); script_xref(name:"CISCO-BUG-ID", value:"CSCsd37415"); script_xref(name:"CISCO-SA", value:"cisco-sa-20070228-mpls"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("cisco_ios_version.nasl"); script_require_keys("Host/Cisco/IOS/Version"); exit(0); } include("audit.inc"); include("cisco_func.inc"); include("cisco_kb_cmd_func.inc"); flag = 0; version = get_kb_item_or_exit("Host/Cisco/IOS/Version"); override = 0; if (version == '12.2(18)SXD1') flag++; else if (version == '12.2(17d)SXB4') flag++; else if (version == '12.2(17d)SXB3') flag++; else if (version == '12.2(17d)SXB2') flag++; else if (version == '12.2(17d)SXB1') flag++; else if (version == '12.2(17b)SXA2') flag++; if (get_kb_item("Host/local_checks_enabled")) { if (flag) { flag = 0; buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config"); if (check_cisco_result(buf)) { if (preg(pattern:"s72033-adventerprisek9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"s72033-advipservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"s72033-entservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"s72033-ipservices_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"s72033-ipservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"s72033-ipservicesk9-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; } } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; } } } if (flag) { security_warning(port:0, extra:cisco_caveat(override)); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
Oval
accepted | 2008-09-08T04:00:56.733-04:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. | ||||
family | ios | ||||
id | oval:org.mitre.oval:def:5869 | ||||
status | accepted | ||||
submitted | 2008-05-26T11:06:36.000-04:00 | ||||
title | Cisco 7600, Catalyst 6000 and 6500 MPLS Packet DoS Vulnerability | ||||
version | 3 |
References
- http://osvdb.org/33067
- http://osvdb.org/33067
- http://secunia.com/advisories/24348
- http://secunia.com/advisories/24348
- http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml
- http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml
- http://www.securitytracker.com/id?1017709
- http://www.securitytracker.com/id?1017709
- http://www.vupen.com/english/advisories/2007/0782
- http://www.vupen.com/english/advisories/2007/0782
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32748
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32748
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5869
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5869