Vulnerabilities > CVE-2007-1258 - Denial-Of-Service vulnerability in IOS

047910
CVSS 6.1 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
low complexity
cisco
nessus

Summary

Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.

Nessus

  • NASL familyCISCO
    NASL idCSCEF90002.NASL
    descriptionThe remote host is a CISCO Catalyst 6500 switch containing a version of IOS that is affected by a denial of service vulnerability when processing malformed MPLS packets. An attacker may exploit this flaw to crash the remote device.
    last seen2020-06-01
    modified2020-06-02
    plugin id24736
    published2007-03-01
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24736
    titleCisco Catalyst Hybrid Mode Malformed MPLS Packet Remote DoS (CSCsd37415, CSCef90002)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(24736);
     script_version("1.19");
     script_cve_id("CVE-2007-1258");
     script_bugtraq_id(22750);
    
     script_name(english:"Cisco Catalyst Hybrid Mode Malformed MPLS Packet Remote DoS (CSCsd37415, CSCef90002)");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote switch can be crashed remotely." );
    
     script_set_attribute(attribute:"description", value: 
    "The remote host is a CISCO Catalyst 6500 switch containing a version
    of IOS that is affected by a denial of service vulnerability when
    processing malformed MPLS packets. 
    
    An attacker may exploit this flaw to crash the remote device." );
     script_set_attribute(attribute:"solution", value:
    "http://www.nessus.org/u?0e6ad627" );
     script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"plugin_publication_date", value: "2007/03/01");
     script_set_attribute(attribute:"vuln_publication_date", value: "2007/02/28");
     script_cvs_date("Date: 2018/06/27 18:42:25");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
     script_end_attributes();
    
     summary["english"] = "Uses SNMP to determine if a flaw is present";
     script_summary(english:summary["english"]);
    
     script_category(ACT_GATHER_INFO);
    
     script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
    
     script_family(english:"CISCO");
    
     script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl");
     script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model");
     exit(0);
    }
    
    
    include('cisco_func.inc');
    
    os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);
    if(!egrep(pattern:".*(Internetwork Operating|IOS).*", string:os)) exit(0);
    hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0);
    if(!ereg(string:hardware, pattern:"^cat6500.*$"))exit(0);
    
    version = extract_version(os);
    if ( ! version ) exit(0);
    
    
    
    
    if ( deprecated_version(version, "12.2SXA") ) vuln ++;
    
    
    if ( "SXB" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(17d)SXB5"),
    		   newest:"12.2(17d)SXB5") ) vuln ++;
    
    if ( "SXB" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(18)SXD3"),
    		   newest:"12.2(18)SXD3") ) vuln ++;
    
    if ( "SXF" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(18)SXF5"),
    		   newest:"12.2(18)SXF5") ) vuln ++;
    
    
    
    if ( vuln == 1 ) security_warning(port:161, proto:"udp");
    else if ( vuln > 1 )  display("IOS version ", version, " identified as vulnerable by multiple checks\n");
    
    
    
  • NASL familyCISCO
    NASL idCISCO-SA-20070228-MPLSHTTP.NASL
    descriptionCisco Catalyst 6500 series systems that are running certain versions of Cisco Internetwork Operating System (IOS) are vulnerable to an attack from a Multi Protocol Label Switching (MPLS) packet. Only the systems that are running in Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the Multilayer Switch Feature Card (MSFC)) or running with Cisco IOS Software Modularity are affected. MPLS packets can only be sent from the local network segment.
    last seen2019-10-28
    modified2010-09-01
    plugin id49001
    published2010-09-01
    reporterThis script is (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49001
    titleCisco Catalyst 6000, 6500 and Cisco 7600 Series MPLS Packet Vulnerability
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    # Security advisory is (C) CISCO, Inc.
    # See https://www.cisco.com/en/US/products/products_security_advisory09186a00807f413e.shtml
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
     script_id(49001);
     script_version("1.16");
     script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");
     script_cve_id("CVE-2007-1258");
     script_name(english:"Cisco Catalyst 6000, 6500 and Cisco 7600 Series MPLS Packet Vulnerability");
     script_summary(english:"Checks the IOS version.");
     script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
     script_set_attribute(attribute:"description", value:
    'Cisco Catalyst 6500 series systems that are running certain versions of
    Cisco Internetwork Operating System (IOS) are vulnerable to an attack
    from a Multi Protocol Label Switching (MPLS) packet. Only the systems
    that are running in Hybrid Mode (Catalyst OS (CatOS) software on the
    Supervisor Engine and IOS Software on the Multilayer Switch Feature
    Card (MSFC)) or running with Cisco IOS Software Modularity are
    affected.
    MPLS packets can only be sent from the local network segment.
    ');
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?99a010c1");
     # https://www.cisco.com/en/US/products/products_security_advisory09186a00807f413e.shtml
     script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?08e188df");
     script_set_attribute(attribute:"solution", value:
    "Apply the relevant patch referenced in Cisco Security Advisory
    cisco-sa-20070228-mpls.");
     script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2007/02/28");
     script_set_attribute(attribute:"patch_publication_date", value:"2007/02/28");
     script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01");
    
     script_end_attributes();
     script_xref(name:"CISCO-BUG-ID", value:"CSCef90002");
     script_xref(name:"CISCO-BUG-ID", value:"CSCsd37415");
     script_xref(name:"CISCO-SA", value:"cisco-sa-20070228-mpls");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc.");
     script_family(english:"CISCO");
     script_dependencie("cisco_ios_version.nasl");
     script_require_keys("Host/Cisco/IOS/Version");
     exit(0);
    }
    
    include("audit.inc");
    include("cisco_func.inc");
    include("cisco_kb_cmd_func.inc");
    
    flag = 0;
    version = get_kb_item_or_exit("Host/Cisco/IOS/Version");
    override = 0;
    
    if (version == '12.2(18)SXD1') flag++;
    else if (version == '12.2(17d)SXB4') flag++;
    else if (version == '12.2(17d)SXB3') flag++;
    else if (version == '12.2(17d)SXB2') flag++;
    else if (version == '12.2(17d)SXB1') flag++;
    else if (version == '12.2(17b)SXA2') flag++;
    
    if (get_kb_item("Host/local_checks_enabled"))
    {
      if (flag)
      {
        flag = 0;
        buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config");
        if (check_cisco_result(buf))
        {
          if (preg(pattern:"s72033-adventerprisek9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"s72033-advipservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"s72033-entservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"s72033-ipservices_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"s72033-ipservicesk9_wan-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"s72033-ipservicesk9-vz.122-18.SXF4.bin", multiline:TRUE, string:buf)) { flag = 1; }
        } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
      }
    }
    
    if (flag)
    {
      security_warning(port:0, extra:cisco_caveat(override));
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    

Oval

accepted2008-09-08T04:00:56.733-04:00
classvulnerability
contributors
nameYuzheng Zhou
organizationHewlett-Packard
descriptionUnspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet.
familyios
idoval:org.mitre.oval:def:5869
statusaccepted
submitted2008-05-26T11:06:36.000-04:00
titleCisco 7600, Catalyst 6000 and 6500 MPLS Packet DoS Vulnerability
version3