File: 2188.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (62 lines) | stat: -rw-r--r-- 1,162 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Rule:

--
Sid:
2188

--
Summary:
This event is generated when a suspicious packet using an unusual 
protocol is sent to a router.

--
Impact:
Denial of Service (DoS).

--
Detailed Information:
A vulnerability exists in multiple Cisco IOS versions such that a Denial
of Service condition can be issued against a device by sending multiple 
packets using IP protocols 53, 55, 77 and 103 directly to that device.

Cisco IOS processes these packets and under certain circumstances, can 
be made to incorrectly flag an input interface as being full.

--
Affected Systems:
Multiple versions of Cisco IOS.

--
Attack Scenarios:
An attacker may send a large number of IP packets using one of the 
protocols 53, 55, 77 or 103 directly to a router. Exploit code exists.

--
Ease of Attack:
Simple. Expoit code exists.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--