Lucene search

K
nessusThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-20090819-FWSM.NASL
HistorySep 17, 2013 - 12:00 a.m.

Firewall Services Module Crafted ICMP Message (cisco-sa-20090819-fwsm)

2013-09-1700:00:00
This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.02 Low

EPSS

Percentile

88.9%

The remote Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by a denial of service (DoS) condition. An attacker can trigger the DoS condition by sending a specially crafted ICMP packet to the device. This will cause the network processor to stop working and result in the DoS condition.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(69923);
  script_version("1.7");
  script_cvs_date("Date: 2018/11/15 20:50:20");

  script_cve_id("CVE-2009-0638");
  script_bugtraq_id(36085);
  script_xref(name:"CISCO-BUG-ID", value:"CSCsz97207");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20090819-fwsm");

  script_name(english:"Firewall Services Module Crafted ICMP Message (cisco-sa-20090819-fwsm)");
  script_summary(english:"Checks the FWSM version");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote device is missing a vendor-supplied security update."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Cisco Firewall Services Module (FWSM) for Cisco Catalyst
6500 Series Switches and Cisco 7600 Series Routers may be affected by a
denial of service (DoS) condition.  An attacker can trigger the DoS
condition by sending a specially crafted ICMP packet to the device. 
This will cause the network processor to stop working and result in the
DoS condition."
  );
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090819-fwsm
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cd33f020");
  script_set_attribute(
    attribute:"solution",
    value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090819-fwsm."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:firewall_services_module");

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/08/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/08/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/17");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CISCO");

  script_dependencies("cisco_fwsm_version.nasl");
  script_require_keys("Host/Cisco/FWSM/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");

version = get_kb_item_or_exit("Host/Cisco/FWSM/Version");

flag = 0;
fixed_version = "";

# Affected versions:
# 2.x	migrate to 3.x or 4.x
if (version =~ "^2\.")
{
  flag++;
  fixed_version = "3.x or 4.x series";
}

# 3.1	< 3.1(16)
if ( (version =~ "^3\.1($|\.|\()") && (cisco_gen_ver_compare(a:version, b:"3.1(16)") < 0) )
{
  flag++;
  fixed_version = "3.1(16)";
}

# 3.2	< 3.2(13)
if ( (version =~ "^3\.2($|\.|\()") && (cisco_gen_ver_compare(a:version, b:"3.2(13)") < 0) )
{
  flag++;
  fixed_version = "3.2(13)";
}

# 4.0	< 4.0(6)
if ( (version =~ "^4\.0($|\.|\()") && (cisco_gen_ver_compare(a:version, b:"4.0(6)") < 0) )
{
  flag++;
  fixed_version = "4.0(6)";
}

if (flag)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fixed_version +
      '\n';
    security_hole(port:0, extra:report);
  }
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
ciscofirewall_services_modulecpe:/h:cisco:firewall_services_module

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.02 Low

EPSS

Percentile

88.9%

Related for CISCO-SA-20090819-FWSM.NASL