Vulnerabilities > CVE-2008-2060 - Unspecified vulnerability in Cisco Intrusion Prevention System 5.1/6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Unspecified vulnerability in Cisco Intrusion Prevention System (IPS) 5.x before 5.1(8)E2 and 6.x before 6.0(5)E2, when inline mode and jumbo Ethernet support are enabled, allows remote attackers to cause a denial of service (panic), and possibly bypass intended restrictions on network traffic, via a "specific series of jumbo Ethernet frames."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20080618-IPS.NASL |
description | According to its self-reported version, the version of the Cisco Intrusion Prevention System Software running on the remote host may be vulnerable to a denial of service (DoS) attack caused by a kernel panic. This is due to the handling of jumbo Ethernet frames when gigabit network interfaces are installed and are deployed in inline mode. |
last seen | 2019-10-28 |
modified | 2013-08-14 |
plugin id | 69335 |
published | 2013-08-14 |
reporter | This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/69335 |
title | Cisco Intrusion Prevention System Jumbo Frame Denial of Service (cisco-sa-20080618-ips) |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 29791 CVE(CAN) ID: CVE-2008-2060 Cisco入侵保护系统是网络安全设备中的一部分,可提供基于网络的威胁防范服务。 某些Cisco IPS平台在处理巨型以太网报文时存在拒绝服务漏洞。如果以inline模式所部署的有漏洞Cisco IPS平台的千兆网口接收到了特定的巨型以太网帧的话,就会出现内核忙碌,导致平台完全失效和网络拒绝服务的情况。仅以混杂模式部署的平台或没有千兆网口的平台不受漏洞影响。 成功利用本文所述的漏洞可能导致网络拒绝服务,必须断电才能恢复运行。Cisco IPS 4260/4270平台的硬件配置了硬件直通以在系统忙碌的情况下传送通讯,因此攻击者可以绕过访问控制和恶意行为检测。 Cisco IPS 6.x Cisco IPS 5.x 厂商补丁: Cisco ----- Cisco已经为此发布了一个安全公告(cisco-sa-20080618-ips)以及相应补丁: cisco-sa-20080618-ips:Cisco Intrusion Prevention System Jumbo Frame Denial of Service 链接:<a href=http://www.cisco.com/warp/public/707/cisco-sa-20080618-ips.shtml target=_blank>http://www.cisco.com/warp/public/707/cisco-sa-20080618-ips.shtml</a> 补丁下载: <a href=http://www.cisco.com/pcgi-bin/tablebuild.pl/ips5?psrtdcat20e2 target=_blank>http://www.cisco.com/pcgi-bin/tablebuild.pl/ips5?psrtdcat20e2</a> <a href=http://www.cisco.com/pcgi-bin/tablebuild.pl/ips6?psrtdcat20e2 target=_blank>http://www.cisco.com/pcgi-bin/tablebuild.pl/ips6?psrtdcat20e2</a> |
id | SSV:3446 |
last seen | 2017-11-19 |
modified | 2008-06-20 |
published | 2008-06-20 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-3446 |
title | Cisco IPS平台Inline模式拒绝服务漏洞 |
References
- http://secunia.com/advisories/30767
- http://secunia.com/advisories/30767
- http://www.cisco.com/en/US/products/products_security_advisory09186a00809b3842.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a00809b3842.shtml
- http://www.securityfocus.com/bid/29791
- http://www.securityfocus.com/bid/29791
- http://www.securitytracker.com/id?1020326
- http://www.securitytracker.com/id?1020326
- http://www.vupen.com/english/advisories/2008/1872/references
- http://www.vupen.com/english/advisories/2008/1872/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43166
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43166