Vulnerabilities > CVE-2008-3813 - Unspecified vulnerability in Cisco IOS
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when the L2TP mgmt daemon process is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted L2TP packet.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20080924-L2TPHTTP.NASL |
description | A vulnerability exists in the Cisco IOS software implementation of Layer 2 Tunneling Protocol (L2TP), which affects limited Cisco IOS software releases. Several features enable the L2TP mgmt daemon process within Cisco IOS software, including but not limited to Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP) and Cisco Virtual Private Dial-Up Networks (VPDN). Once this process is enabled the device is vulnerable. This vulnerability will result in a reload of the device when processing a specially crafted L2TP packet. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. |
last seen | 2019-10-28 |
modified | 2010-09-01 |
plugin id | 49021 |
published | 2010-09-01 |
reporter | This script is (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/49021 |
title | Cisco IOS Software Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability |
code |
|
Oval
accepted | 2008-12-22T04:00:07.377-05:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when the L2TP mgmt daemon process is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted L2TP packet. | ||||
family | ios | ||||
id | oval:org.mitre.oval:def:5362 | ||||
status | accepted | ||||
submitted | 2008-09-24T11:06:36.000-04:00 | ||||
title | Cisco IOS Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability | ||||
version | 6 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31358 CVE ID: CVE-2008-3813 CNCVE ID:CNCVE-20083813 Cisco IOS是一款流行的网络操作系统。 Cisco IOS第二层隧道协议实现存在一个漏洞,远程攻击者可以利用漏洞对设备进行拒绝服务攻击,导致设备重载。 Cisco IOS软件中的L2TP mgmt守护进程启用多个功能,包括Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP)和Cisco Virtual Private Dial-Up Networks (VPDN)。L2TP mgmt守护在处理特殊构建的L2TP报文时可导致设备重载。 此漏洞的Cisco bug ID为CSCsh48879,CVE ID为CVE-2008-3813。 Cisco IOS 12.4XV Cisco IOS 12.4XJ Cisco IOS 12.4T Cisco IOS 12.4SW Cisco IOS 12.4MR Cisco IOS 12.2SE Cisco IOS 12.2(37)SG Cisco IOS 12.2(37)SE Cisco IOS 12.2(33)SRB 可参考如下安全公告获得补丁信息: <a href=http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml target=_blank>http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml</a> |
id | SSV:4109 |
last seen | 2017-11-19 |
modified | 2008-09-26 |
published | 2008-09-26 |
reporter | Root |
title | Cisco IOS第二层隧道协议远程拒绝服务漏洞 |
References
- http://secunia.com/advisories/31990
- http://secunia.com/advisories/31990
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml
- http://www.securitytracker.com/id?1020938
- http://www.securitytracker.com/id?1020938
- http://www.vupen.com/english/advisories/2008/2670
- http://www.vupen.com/english/advisories/2008/2670
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362