Vulnerabilities > CVE-2008-3798 - Unspecified vulnerability in Cisco IOS 12.4/12.4Mr
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Cisco IOS 12.4 allows remote attackers to cause a denial of service (device crash) via a normal, properly formed SSL packet that occurs during termination of an SSL session.
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20080924-SSLHTTP.NASL |
description | A Cisco IOS device may crash while processing an SSL packet. This can happen during the termination of an SSL-based session. The offending packet is not malformed and is normally received as part of the packet exchange. Cisco has released free software updates that address this vulnerability. Aside from disabling affected services, there are no available workarounds to mitigate an exploit of this vulnerability. |
last seen | 2019-10-28 |
modified | 2010-09-01 |
plugin id | 49026 |
published | 2010-09-01 |
reporter | This script is (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49026 |
title | Vulnerability in Cisco IOS While Processing SSL Packet - Cisco Systems |
code |
|
Oval
accepted | 2012-01-30T04:00:59.267-05:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Cisco IOS 12.4 allows remote attackers to cause a denial of service (device crash) via a normal, properly formed SSL packet that occurs during termination of an SSL session. | ||||||||||||
family | ios | ||||||||||||
id | oval:org.mitre.oval:def:6087 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2008-09-24T11:06:36.000-04:00 | ||||||||||||
title | Cisco IOS Processing SSL Packet Vulnerability | ||||||||||||
version | 9 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31365 CVE ID: CVE-2008-3798 CNCVE ID:CNCVE-20083798 Cisco IOS是一款流行的网络操作系统。 Cisco IOS在处理SSL会话终止时存在问题,远程攻击者可以利用漏洞对服务进行拒绝服务攻击。 此漏洞不需要合法的信任凭证,如用户名,密码或证书,SSL协议使用TCP作为传输协议,所以需要三次TCP握手完成后来进行此攻击,可减低漏洞的危险性。通过伪造的IP地址可利用此漏洞。 运行基于SSL服务的Cisco IOS软件在进行SSL会话终止时导致服务崩溃。 此漏洞的Cisco bug ID为CSCsj85065,CVE ID为CVE-2008-3798。 Cisco IOS 12.4MR Cisco IOS 12.4 可参考如下安全公告获得补丁信息: <a href=http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml target=_blank>http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml</a> |
id | SSV:4110 |
last seen | 2017-11-19 |
modified | 2008-09-26 |
published | 2008-09-26 |
reporter | Root |
title | Cisco IOS SSL会话终止远程拒绝服务漏洞 |
References
- http://secunia.com/advisories/31990
- http://secunia.com/advisories/31990
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0146c.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0146c.shtml
- http://www.securitytracker.com/id?1020930
- http://www.securitytracker.com/id?1020930
- http://www.vupen.com/english/advisories/2008/2670
- http://www.vupen.com/english/advisories/2008/2670
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6087
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6087