The remote version of IOS is vulnerable to a code execution attack when processing malformed IPv6 packets.
To exploit this flaw, an attacker would need to ability to send a malformed packet from a local segment and may exploit this issue to cause the remote device to reload repeatedly or to execute arbitrary code in the remote IOS.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if(description)
{
script_id(19771);
script_version("1.22");
script_cve_id("CVE-2005-2451");
script_bugtraq_id(14414);
script_name(english:"Cisco IOS IPv6 Packet Processing Arbitrary Code Execution (CSCef68324)");
script_set_attribute(attribute:"synopsis", value:
"The remote router contains a vulnerability which may allow an attacker to
execute arbitrary code on it." );
script_set_attribute(attribute:"description", value:
"The remote version of IOS is vulnerable to a code execution attack
when processing malformed IPv6 packets.
To exploit this flaw, an attacker would need to ability to send a malformed
packet from a local segment and may exploit this issue to cause the remote
device to reload repeatedly or to execute arbitrary code in the remote IOS." );
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7bfd2064" );
script_set_attribute(attribute:"solution", value:
"Cisco has made a set of patches available which are listed at the address above." );
script_set_cvss_base_vector("CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/22");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/07/27");
script_cvs_date("Date: 2018/11/15 20:50:20");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
script_end_attributes();
summary["english"] = "Uses SNMP to determine if a flaw is present";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
script_family(english:"CISCO");
script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl");
script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model");
exit(0);
}
include('cisco_func.inc');
include('audit.inc');
os = get_kb_item_or_exit("SNMP/sysDesc");
hardware = get_kb_item_or_exit("CISCO/model");
version = extract_version(os);
if ( ! version )
audit(AUDIT_FN_FAIL, 'extract_version');
# 12.0
if ( deprecated_version(version, "12.0SL", "12.0ST", "12.0SY") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.0(26)S6", "12.0(27)S5", "12.0(28)S3", "12.0(30)S2"),
newest:"12.0(30)S2") ) vuln ++;
# 12.1
if ( deprecated_version(version, "12.1XU", "12.1XV", "12.1YB", "12.1YC", "12.1YD", "12.1YE", "12.1YF", "12.1YH", "12.1YI") ) vuln ++;
# 12.2
if ( deprecated_version(version, "12.2B","12.2BW", "12.2BY", "12.2BX", "12.2BZ", "12.2CX", "12.2CY", "12.2DD", "12.2DX", "12.2JA", "12.2MX", "12.2SO", "12.2SU", "12.2SX", "12.2SXA", "12.2SY", "12.2SZ", "12.2XA", "12.2XB", "12.2CX", "12.2XF", "12.2XG", "12.2XH", "12.2XI", "12.2XJ", "12.2XK", "12.2XL", "12.2XM", "12.2XN", "12.2XQ", "12.2XR", "12.2XT", "12.2XU", "12.2XW", "12.2XZ", "12.2YB", "12.2YC", "12.2YD", "12.2YE", "12.2YF", "12.2YG", "12.2YH", "12.2YJ", "12.2YK", "12.2YL", "12.2YM", "12.2YN", "12.2YO", "12.2YP", "12.2YQ", "12.2YR", "12.2YT", "12.2YU", "12.2YV", "12.2YW", "12.2YX", "12.2YY", "12.2YZ", "12.2ZA", "12.2ZB", "12.2ZC", "12.2ZE", "12.2ZF", "12.2ZH", "12.2ZJ", "12.2ZL", "12.2ZN", "12.2ZO", "12.2ZP") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(15)BC2h"),
newest:"12.2(15)BC2h") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(20)EU1"),
newest:"12.2(20)EU1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(20)EW2"),
newest:"12.2(20)EW2") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(20)EWA2", "12.2(25)EWA1"),
newest:"12.2(25)EW1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(25)EZ1"),
newest:"12.2(25)EZ1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(15)JK4"),
newest:"12.2(15)JK4") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(4)MB13b"),
newest:"12.2(4)MB13b") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(15)MC2c"),
newest:"12.2(15)MC2c") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(14)S14", "12.2(18)S9", "12.2(20)S8", "12.2(25)S4"),
newest:"12.2(25)S4") ) vuln ++;
# only 12.2SEB affected. check_release() doesn't account for this - it treats all 12.2SEn
# releases (where 'n' is an uppercase letter) as 12.2SE releases
if ( "SEB" >< version &&
check_release(version:version,
patched:make_list("12.2(25)SEB3"),
newest:"12.2(25)SEB3") ) vuln ++;
# only 12.2SEC affected. check_release() doesn't account for this - it treats all 12.2SEn
# releases (where 'n' is an uppercase letter) as 12.2SE releases
if ( "SEC" >< version &&
check_release(version:version,
patched:make_list("12.2(25)SEC1"),
newest:"12.2(25)SEC1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(18)SV3", "12.2(22)SV1", "12.2(23)SV1", "12.2(24)SV1", "12.2(25)SV2"),
newest:"12.2(25)SV2") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(25)SW3a"),
newest:"12.2(25)SW3a") ) vuln ++;
# only 12.2SXB affected. check_release() doesn't account for this - it treats all 12.2SXn
# releases (where 'n' is an uppercase letter) as 12.2SX releases
if ( "SXB" >< version &&
check_release(version:version,
patched:make_list("12.2(17d)SXB8"),
newest:"12.2(17d)SXB8") ) vuln ++;
# only 12.2SXD affected. check_release() doesn't account for this - it treats all 12.2SXn
# releases (where 'n' is an uppercase letter) as 12.2SX releases
if ( "SXD" >< version &&
check_release(version:version,
patched:make_list("12.2(18)SXD4"),
newest:"12.2(18)SXD4") ) vuln ++;
# only 12.2SXE affected. check_release() doesn't account for this - it treats all 12.2SXn
# releases (where 'n' is an uppercase letter) as 12.2SX releases
if ( "SXE" >< version &&
check_release(version:version,
patched:make_list("12.2(18)SXE1"),
newest:"12.2(18)SXE1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(13)T16", "12.2(15)T16"),
newest:"12.2(15)T16") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(4)YA10"),
newest:"12.2(4)YA10") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.2(13)ZD3"),
newest:"12.2(13)ZD3") ) vuln ++;
# 12.3
if ( deprecated_version(version, "12.3BW", "12.3XD", "12.3XF", "12.3XH", "12.3XJ", "12.3XL", "12.3XM", "12.3XS", "12.3XT", "12.3XU", "12.3XW", "12.3XX", "12.3YD", "12.3YK") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(3h)", "12.3(5e)", "12.3(6e)", "12.3(9d)", "12.3(10d)", "12.3(12b)", "12.3(13a)", "12.3(15)"),
newest:"12.3(15)") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(3h)", "12.3(5e)", "12.3(6e)", "12.3(9d)", "12.3(10d)", "12.3(12b)", "12.3(13a)", "12.3(15)"),
newest:"12.3(15)") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(5a)B5"),
newest:"12.3(5a)B5") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(9a)BC6"),
newest:"12.3(9a)BC6") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(4)JA"),
newest:"12.3(4)JA") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(2)JK"),
newest:"12.3(2)JK") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(7)T9", "12.3(8)T8", "12.3(11)T5", "12.3(14)T2"),
newest:"12.3(14)T2") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(2)XA4"),
newest:"12.3(2)XA4") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(2)XC3"),
newest:"12.3(2)XC3") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(2)XE3"),
newest:"12.3(2)XE3") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(4)XG4"),
newest:"12.3(4)XG4") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(4)XI4"),
newest:"12.3(4)XI4") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(4)XK3"),
newest:"12.3(4)XK3") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(4)XQ1"),
newest:"12.3(4)XQ1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(7)XR4"),
newest:"12.3(7)XR4") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(8)XY6"),
newest:"12.3(8)XY6") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(8)YA1"),
newest:"12.3(8)YA1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(11)YF3"),
newest:"12.3(11)YF3") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(8)YG2"),
newest:"12.3(8)YG2") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(8)YI1"),
newest:"12.3(8)YI1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(11)YJ"),
newest:"12.3(11)YJ") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(14)YQ1"),
newest:"12.3(14)YQ1") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(11)YS"),
newest:"12.3(11)YS") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(14)YT"),
newest:"12.3(14)YT") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.3(14)YU"),
newest:"12.3(14)YU") ) vuln ++;
# 12.4
if ( check_release(version:version,
patched:make_list("12.4(1)"),
newest:"12.4(1)") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.4(2)MR"),
newest:"12.4(2)MR") ) vuln ++;
if ( check_release(version:version,
patched:make_list("12.4(2)T"),
newest:"12.4(2)T") ) vuln ++;
if ( vuln == 1 ) security_warning(port:161, proto:"udp");
else if ( vuln > 1 ) display("IOS version ", version, " identified as vulnerable by multiple checks\n");
else audit(AUDIT_INST_VER_NOT_VULN, 'IOS', version);