code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(109393);
script_version("1.8");
script_cvs_date("Date: 2019/11/08");
script_cve_id("CVE-2018-0241");
script_bugtraq_id(103929);
script_xref(name:"CISCO-BUG-ID", value:"CSCvi35625");
script_xref(name:"CISCO-SA", value:"cisco-sa-20180418-iosxr");
script_name(english:"Cisco IOS XR Software UDP Broadcast Forwarding Denial of Service Vulnerability (cisco-sa-20180418-iosxr)");
script_summary(english:"Checks the IOS XR version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the IOS XR is affected
by a denial of service vulnerability. Please see the included Cisco BID
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-iosxr
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3baec20c");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi35625");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvi35625.");
script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/18");
script_set_attribute(attribute:"patch_publication_date", value:"2018/04/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/04/27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/o:cisco:ios_xr");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xr_version.nasl");
script_require_keys("Host/Cisco/IOS-XR/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS XR");
version_list = make_list(
"6.3.1"
);
version_range = [
{'min_ver' : '0.0.0.0', 'fix_ver' : '6.2.4'}
];
workarounds = make_list(CISCO_WORKAROUNDS['ipv4_helper-address']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCvi35625",
'cmds' , make_list("show running-config | include ipv4 helper-address")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list, vuln_ranges:version_range);
|