![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.14337 |
Category: | CISCO |
Title: | CSCec16481 |
Summary: | NOSUMMARY |
Description: | Description: The target is a Cisco device running a version of IOS that is vulnerable to a DoS attack from a malformed OSPF packet. Given knowledge of OSPF area number, netmask, hello, and dead timers that are configured on the targeted interface, a remote attacker can send a malformed OSPF packet and cause the device to be reset, which may take several minutes. Note, though, that the OSPF protocol is not enabled by default. This vulnerability is documented as Cisco Bug ID CSCec16481. Solution : http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
BugTraq ID: 10971 Common Vulnerability Exposure (CVE) ID: CVE-2004-1454 http://www.securityfocus.com/bid/10971 CERT/CC vulnerability note: VU#989406 http://www.kb.cert.org/vuls/id/989406 Computer Incident Advisory Center Bulletin: O-199 http://www.ciac.org/ciac/bulletins/o-199.shtml Cisco Security Advisory: 20040818 Cisco IOS Malformed OSPF Packet Causes Reload http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml http://secunia.com/advisories/12322 XForce ISS Database: cisco-ios-ospf-dos(17033) https://exchange.xforce.ibmcloud.com/vulnerabilities/17033 |
Copyright | This script is (C) 2004 Tenable Network Security and George Theall |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |