code |
include("compat.inc");
if (description)
{
script_id(94252);
script_version("1.11");
script_cvs_date("Date: 2019/11/14");
script_cve_id("CVE-2016-6391");
script_bugtraq_id(93197);
script_xref(name:"CISCO-BUG-ID", value:"CSCur69036");
script_xref(name:"CISCO-SA", value:"cisco-sa-20160928-cip");
script_name(english:"Cisco IOS Software CIP Request DoS (cisco-sa-20160928-cip)");
script_summary(english:"Checks the IOS version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version and configuration, the Cisco
IOS software running on the remote device is affected by a denial of
service vulnerability in the Common Industrial Protocol (CIP) feature
due to improper processing of unusual but valid CIP requests. An
unauthenticated, remote attacker can exploit this, via specially
crafted CIP requests, to cause the switch to stop processing traffic,
requiring a device restart to regain functionality.");
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ce256c81");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCur69036.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-6391");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/28");
script_set_attribute(attribute:"patch_publication_date", value:"2016/09/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/25");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");
flag = 0;
override = 0;
ver = get_kb_item_or_exit("Host/Cisco/IOS/Version");
vuln_versions = make_list(
'15.3(3)JAB',
'15.3(3)JB75',
'15.2(3)EA',
'12.2(55)SE7',
'12.2(50)SE3',
'15.0(2)SE6',
'15.2(2)E',
'15.3(3)JNP',
'15.3(3)JA',
'15.3(3)JAX',
'15.3(3)JN8',
'15.0(2)SE5',
'15.3(3)JA5',
'12.2(55)SE6',
'15.3(3)JBB6',
'12.2(46)SE',
'12.2(50)SE2',
'15.3(3)JB',
'15.3(3)JBB6a',
'12.2(50)SE',
'15.3(3)JNC',
'15.3(3)JN4',
'15.3(3)JBB2',
'15.2(2)E1',
'12.2(55)SE',
'15.0(2)SE',
'12.2(44)EX1',
'15.3(3)JA9',
'15.3(3)JA1',
'15.0(2)SE1',
'15.2(1)EY',
'15.3(3)JN7',
'15.3(3)JBB1',
'15.0(1)EY',
'15.3(3)JA8',
'12.2(50)SE4',
'15.0(2)EB',
'15.3(3)JA7',
'12.2(55)SE3',
'15.3(3)JBB4',
'15.3(3)JA1n',
'15.3(3)JNC1',
'15.0(2)SE9',
'12.2(46)SE2',
'15.3(3)JA77',
'15.0(2)SE4',
'12.2(55)SE4',
'15.3(3)JNP1',
'15.0(2)EY1',
'15.2(2)E4',
'15.3(3)JC',
'15.3(3)JBB8',
'12.2(44)EX',
'15.0(2)EY2',
'15.0(2)SE2',
'15.0(2)SE7',
'15.3(3)JA4',
'15.3(3)JAX1',
'15.2(2)E2',
'15.0(1)EY2',
'12.2(55)SE5',
'12.2(50)SE5',
'15.3(3)JAX2',
'15.0(1)EY1',
'15.3(3)JBB5',
'15.3(3)JA1m',
'15.3(3)JNB1',
'15.0(2)SE3',
'15.3(3)JBB',
'15.0(2)EY',
'15.3(3)JNB',
'15.3(3)JNB2',
'15.3(3)JN3',
'12.2(50)SE1',
'15.0(2)EY3',
'12.2(55)SE9',
'12.2(55)SE10',
'12.2(58)SE2',
'15.3(3)JAA',
'15.3(3)JNB3',
'12.2(46)SE1',
'12.2(52)SE',
'12.2(55)SE8',
'15.3(3)JBB50',
'12.2(52)SE1'
);
foreach version (vuln_versions)
{
if (version == ver)
{
flag++;
break;
}
}
if (flag && get_kb_item("Host/local_checks_enabled"))
{
flag = 0;
buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config",
"show running-config");
if (check_cisco_result(buf))
{
if (preg(multiline:TRUE, pattern:"^\s*cip enable", string:buf))
flag++;
}
else if (cisco_needs_enable(buf))
{
flag++;
override++;
}
}
if (flag)
{
security_report_cisco(
port : 0,
severity : SECURITY_HOLE,
override : override,
version : ver,
bug_id : 'CSCur69036',
cmds : make_list('show running-config', 'show running-config')
);
}
else audit(AUDIT_INST_VER_NOT_VULN, "Cisco IOS software", ver);
|