Vulnerabilities > CVE-2008-3803 - Unspecified vulnerability in Cisco IOS 12.0S/12.0Sx/12.0Sz
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
A "logic error" in Cisco IOS 12.0 through 12.4, when a Multiprotocol Label Switching (MPLS) VPN with extended communities is configured, sometimes causes a corrupted route target (RT) to be used, which allows remote attackers to read traffic from other VPNs in opportunistic circumstances.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20080924-VPNHTTP.NASL |
description | Devices running Cisco IOS versions 12.0S, 12.2, 12.3 or 12.4 and configured for Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs) or VPN Routing and Forwarding Lite (VRF Lite) and using Border Gateway Protocol (BGP) between Customer Edge (CE) and Provider Edge (PE) devices may permit information to propagate between VPNs. Workarounds are available to help mitigate this vulnerability. This issue is triggered by a logic error when processing extended communities on the PE device. This issue cannot be deterministically exploited by an attacker. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available. |
last seen | 2019-10-28 |
modified | 2010-09-01 |
plugin id | 49028 |
published | 2010-09-01 |
reporter | This script is (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49028 |
title | Cisco IOS MPLS VPN May Leak Information - Cisco Systems |
Oval
accepted | 2008-12-22T04:00:09.762-05:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | A "logic error" in Cisco IOS 12.0 through 12.4, when a Multiprotocol Label Switching (MPLS) VPN with extended communities is configured, sometimes causes a corrupted route target (RT) to be used, which allows remote attackers to read traffic from other VPNs in opportunistic circumstances. | ||||
family | ios | ||||
id | oval:org.mitre.oval:def:5919 | ||||
status | accepted | ||||
submitted | 2008-09-24T11:06:36.000-04:00 | ||||
title | Cisco IOS MPLS VPN May Leak Information Vulnerability | ||||
version | 6 |
References
- http://secunia.com/advisories/31990
- http://secunia.com/advisories/31990
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014a9.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014a9.shtml
- http://www.securityfocus.com/bid/31366
- http://www.securityfocus.com/bid/31366
- http://www.securitytracker.com/id?1020940
- http://www.securitytracker.com/id?1020940
- http://www.vupen.com/english/advisories/2008/2670
- http://www.vupen.com/english/advisories/2008/2670
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5919
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5919