Crafted IP Option Vulnerability (cisco-sa-20070124-crafted-ip-option)

2013-12-14T00:00:00
ID CISCO-SA-20070124-CRAFTED-IP-OPTION-IOSXR.NASL
Type nessus
Reporter Tenable
Modified 2018-07-02T00:00:00

Description

Cisco routers and switches running Cisco IOS XR software may be vulnerable to a remotely exploitable crafted IP option Denial of Service (DoS) attack. Exploitation of the vulnerability may potentially allow for arbitrary code execution. The vulnerability may be exploited after processing an Internet Control Message Protocol (ICMP) packet, Protocol Independent Multicast version 2 (PIMv2) packet, Pragmatic General Multicast (PGM) packet, or URL Rendezvous Directory (URD) packet containing a specific crafted IP option in the packet\'s IP header. No other IP protocols are affected by this issue. Cisco has made free software available to address this vulnerability for affected customers.

                                        
                                            #TRUSTED 87182840e7750fd1e09cd6e624b0e03abf214299524032e31bb177d9d3d85f2b251adbe28608862d9195b901b29d696b0adc267e94a74278bd31e483145444122832828b6daa4f2cce280b956d2af4bfc671dfafcaa262d3230f11233f4f7f020d30c9763365215650a9fab5d9c46ab253010ca239f4c5d2c042d161d35e2c2c63a9ed4a7290b00fc2744ecc32f7b3732215c0e2d3b8bff8532824ba65e8afc2e6393bfa8f2f9648e7e2e950e861f15be05ce51dccd8eda7e1fbd5a2b8b7e4e29cb96e37354737eb3f90a3c04c1652c15e76a74c9898637628dfbe5f7aa7589c1f0de2c2fd2d29e25c52cfb9c661950027f4b61f8cce9043a6368d79b0f3d7fe5da4ea589e378e588b35092285376fd092f9a7b20f37a493f1616de6d7e3832504d9676812785c97624c62d44fc06f1232cc4aa08d95ca6ce88f152b0db6440e62f2840cab3549d7a74d4df25814d7ee27835967d6681ea7e5c759ea4d59cd14bec04f42962b13a46a3ca041ec420a7e96d7afb147d8441fb7be6041bd874676e82c0d5099ef5351fd00cdb7b3d6c65db89ef30a6b65cd5d7ddcc0b74a0c737033ab4798c16b0d0990ab7061add3fd70d445d65dd2d63409711729def0b4fdfe270af733a012b16c7d41d1b26b32865f866aaab852e8d184316e5a7e014ec52f8cd6b294b4acdc14c9197179b5b26bb1a1b07282329bb09af43ba797c7491e7c
#
# (C) Tenable Network Security, Inc.
#
# Security advisory is (C) CISCO, Inc.
# See http://www.cisco.com/en/US/products/csa/cisco-sa-20070124-crafted-ip-option.html
#

include("compat.inc");

if (description)
{
  script_id(71431);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/02");

  script_cve_id("CVE-2007-0480");
  script_bugtraq_id(22211);
  script_xref(name:"CERT", value:"341288");
  script_xref(name:"CISCO-BUG-ID", value:"CSCeh52410");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20070124-crafted-ip-option");

  script_name(english:"Crafted IP Option Vulnerability (cisco-sa-20070124-crafted-ip-option)");
  script_summary(english:"Checks IOS XR version");

  script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"Cisco routers and switches running Cisco IOS XR software may be
vulnerable to a remotely exploitable crafted IP option Denial of Service
(DoS) attack.  Exploitation of the vulnerability may potentially allow
for arbitrary code execution.  The vulnerability may be exploited after
processing an Internet Control Message Protocol (ICMP) packet, Protocol
Independent Multicast version 2 (PIMv2) packet, Pragmatic General
Multicast (PGM) packet, or URL Rendezvous Directory (URD) packet
containing a specific crafted IP option in the packet\'s IP header.  No
other IP protocols are affected by this issue.  Cisco has made free
software available to address this vulnerability for affected
customers.");
  # http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070124-crafted-ip-option
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cdec28c3");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20070124-crafted-ip-option.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2007/01/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2007/01/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xr");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is (C) 2013-2018 Tenable Network Security, Inc.");
  script_family(english:"CISCO");

  script_dependencies("cisco_ios_xr_version.nasl");
  script_require_keys("Host/Cisco/IOS-XR/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
report = "";
cbi = "CSCeh52410";
override = 0;

version = get_kb_item_or_exit("Host/Cisco/IOS-XR/Version");
if ((cisco_gen_ver_compare(a:version, b:"3.2.82.3") >= 0) && (cisco_gen_ver_compare(a:version, b:"3.3") == -1)) flag ++;
fixed_ver = "upgrade to 3.3.0.2 or later";


if (get_kb_item("Host/local_checks_enabled"))
{
  if (flag)
  {
    flag = 0;
    buf = cisco_command_kb_item("Host/Cisco/Config/show_inventory_all", "show inventory all");
    if (check_cisco_result(buf))
    {
      if (preg(multiline:TRUE, pattern:"CRS-1", string:buf)) { flag = 1; }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
  }

  if (flag)
  {
    flag = 0;
    buf = cisco_command_kb_item("Host/Cisco/Config/show_ipv4_interface", "show ipv4 interface");
    if (check_cisco_result(buf))
    {
      if (preg(multiline:TRUE, pattern:"protocol is Up", string:buf)) { flag = 1; }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
  }
}

if (flag)
{
  report =
    '\n  Cisco Bug ID        : ' + cbi +
    '\n    Installed Release : ' + version +
    '\n    Fixed Release     : ' + fixed_ver + '\n';

  security_hole(port:0, extra:report + cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");