Vulnerabilities > CVE-2011-3273 - Resource Management Errors vulnerability in Cisco IOS

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
cisco
CWE-399
nessus

Summary

Memory leak in Cisco IOS 15.0 through 15.1, when IPS or Zone-Based Firewall (aka ZBFW) is configured, allows remote attackers to cause a denial of service (memory consumption or device crash) via vectors that trigger many session creation flows, aka Bug ID CSCti79848.

Common Weakness Enumeration (CWE)

Nessus

NASL familyCISCO
NASL idCISCO-SA-20110928-ZBFWHTTP.NASL
descriptionCisco IOS Software contains two vulnerabilities related to Cisco IOS Intrusion Prevention System (IPS) and Cisco IOS Zone-Based Firewall features. These vulnerabilities are : - Memory leak - Denial of service caused by processing specially crafted HTTP packets Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available.
last seen2019-10-28
modified2011-09-29
plugin id56321
published2011-09-29
reporterThis script is (C) 2011-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/56321
titleCisco IOS Software IPS and Zone-Based Firewall Vulnerabilities - Cisco Systems
code
#TRUSTED 0b690d01d3d85af3540d2bee964d91d56821fe9d896db6f52a26ad069c64d92ef515c45ead925186e73b9e05e6808a3ad9d3ab440e6c42f1ad724d8e5f975717a06c57fd9264ad5ff6dba16ac454630ee9290e443106db66339a49a9ed142a65b2015ea593e12ab7f9a6c37c9d67046d53d9a8d22c93bcd6ab4dfdccc27cadc5db6707b83507d8404239a9bd87da1edef3a936bff4f3db8a00c49366c51247f0d7218746ce1e2d6366a307356aef6d6aeba7f2c3d6ef718b3972ff2f4647f980f41c981d81ef7fc0dac958865e0a6a70b2ff3ff7b7cc207712fcd5ce249d983cde6db5739d68181a53794b974b44b92259afd88a9e53473cc24c2f96dc5e514b8f848ec443793a3ce0d05975fd5f27a980b73d8a30bd941b7e48d7f4bcdcde97fa93f7a22334f683f74945ec43287729cba1aa961d3f21b184b66651429df28e2925c2966a64563797cd81cb482b785a9237cd156135832eed98f4bdba051aa9a254f159e1da7cca7e44fe087289f79a74f81089cafcf4dfc1010123325c7f190d96a65d132cfc4c7dcf053a4b74aee287c361067191f7b7371045c12a959ea879313cd391825bf42f7303ea1aaec8687e7683c62322245b8bbd8c78929fc2281a4ed7e9de64f1cc8e28a4743889c1212e3163d0d5b76b8207636c413783acdf348db995280bc6d1b50fe46d41990cdcff6485949fcfaf4541d3f796f4cf02b7
#
# (C) Tenable Network Security, Inc.
#
# Security advisory is (C) CISCO, Inc.
# See https://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d57.shtml

include("compat.inc");

if (description)
{
 script_id(56321);
 script_version("1.19");
 script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");

 script_cve_id("CVE-2011-3273", "CVE-2011-3281");
 script_bugtraq_id(49826);
 script_xref(name:"CISCO-BUG-ID", value:"CSCti79848");
 script_xref(name:"CISCO-BUG-ID", value:"CSCto68554");
 script_xref(name:"CISCO-BUG-ID", value:"CSCtq28732");
 script_xref(name:"CISCO-SA", value:"cisco-sa-20110928-zbfw");

 script_name(english:"Cisco IOS Software IPS and Zone-Based Firewall Vulnerabilities - Cisco Systems");
 script_summary(english:"Checks the IOS version.");

 script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
 script_set_attribute(attribute:"description", value:
"Cisco IOS Software contains two vulnerabilities related to Cisco IOS
Intrusion Prevention System (IPS) and Cisco IOS Zone-Based Firewall
features. These vulnerabilities are :

  - Memory leak

  - Denial of service caused by processing specially
    crafted HTTP packets

Cisco has released free software updates that address these
vulnerabilities. Workarounds that mitigate these vulnerabilities are
not available.");
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?adac0917");
 # https://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d57.shtml
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e4f83d3b");
 script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20110928-zbfw.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2011/09/29");
 script_set_attribute(attribute:"patch_publication_date", value:"2011/09/29");
 script_set_attribute(attribute:"plugin_publication_date", value:"2011/09/29");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is (C) 2011-2018 Tenable Network Security, Inc.");
 script_family(english:"CISCO");

 script_dependencies("cisco_ios_version.nasl");
 script_require_keys("Host/Cisco/IOS/Version");

 exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
override = 0;
version = get_kb_item_or_exit("Host/Cisco/IOS/Version");

if (version == '15.1(4)XB4') flag++;
else if (version == '15.1(1)XB') flag++;
else if (version == '15.1(3)T1') flag++;
else if (version == '15.1(3)T') flag++;
else if (version == '15.1(2)T3') flag++;
else if (version == '15.1(2)T2a') flag++;
else if (version == '15.1(2)T2') flag++;
else if (version == '15.1(2)T1') flag++;
else if (version == '15.1(2)T0a') flag++;
else if (version == '15.1(2)T') flag++;
else if (version == '15.1(1)T3') flag++;
else if (version == '15.1(1)T2') flag++;
else if (version == '15.1(1)T1') flag++;
else if (version == '15.1(1)T') flag++;
else if (version == '15.1(4)M0b') flag++;
else if (version == '15.1(4)M0a') flag++;
else if (version == '15.1(4)M') flag++;
else if (version == '15.1(2)GC1') flag++;
else if (version == '15.1(2)GC') flag++;
else if (version == '15.0(1)XA5') flag++;
else if (version == '15.0(1)XA4') flag++;
else if (version == '15.0(1)XA3') flag++;
else if (version == '15.0(1)XA2') flag++;
else if (version == '15.0(1)XA1') flag++;
else if (version == '15.0(1)XA') flag++;
else if (version == '15.0(1)M6') flag++;
else if (version == '15.0(1)M5') flag++;
else if (version == '15.0(1)M4') flag++;
else if (version == '15.0(1)M3') flag++;
else if (version == '15.0(1)M2') flag++;
else if (version == '15.0(1)M1') flag++;
else if (version == '15.0(1)M') flag++;

if (get_kb_item("Host/local_checks_enabled"))
{
  if (flag)
  {
    flag = 0;
    buf = cisco_command_kb_item("Host/Cisco/Config/show_ip_ips_interfaces", "show ip ips interfaces");
    if (check_cisco_result(buf))
    {
      if (preg(pattern:"IPS rule", multiline:TRUE, string:buf)) { flag = 1; }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }

    buf = cisco_command_kb_item("Host/Cisco/Config/show_zone_security", "show zone security");
    if (check_cisco_result(buf))
    {
      if (preg(pattern:"Member Interfaces:", multiline:TRUE, string:buf)) { flag = 1; }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
  }
}

if (flag)
{
  security_hole(port:0, extra:cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");