Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.14337
Category:CISCO
Title:CSCec16481
Summary:NOSUMMARY
Description:Description:

The target is a Cisco device running a version of IOS that is vulnerable
to a DoS attack from a malformed OSPF packet. Given knowledge of OSPF
area number, netmask, hello, and dead timers that are configured on the
targeted interface, a remote attacker can send a malformed OSPF packet and
cause the device to be reset, which may take several minutes. Note,
though, that the OSPF protocol is not enabled by default.

This vulnerability is documented as Cisco Bug ID CSCec16481.


Solution : http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml
Risk factor : High

*** As Nessus solely relied on the banner of the remote host
*** this might be a false positive


Cross-Ref: BugTraq ID: 10971
Common Vulnerability Exposure (CVE) ID: CVE-2004-1454
http://www.securityfocus.com/bid/10971
CERT/CC vulnerability note: VU#989406
http://www.kb.cert.org/vuls/id/989406
Computer Incident Advisory Center Bulletin: O-199
http://www.ciac.org/ciac/bulletins/o-199.shtml
Cisco Security Advisory: 20040818 Cisco IOS Malformed OSPF Packet Causes Reload
http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml
http://secunia.com/advisories/12322
XForce ISS Database: cisco-ios-ospf-dos(17033)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17033
CopyrightThis script is (C) 2004 Tenable Network Security and George Theall

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.