Lucene search

K
nessusThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.CSCEH52410.NASL
HistoryMar 01, 2007 - 12:00 a.m.

Cisco Multiple Devices Crafted IP Option Remote Code Execution (CSCeh52410)

2007-03-0100:00:00
This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
www.tenable.com
75

The remote version of IOS contains a flaw that could cause the remote router to crash when processing specially malformed IP packets.

An attacker might use these flaws to execute arbitrary code on the remote routers.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(24741);
 script_version("1.21");
 script_cve_id("CVE-2007-0480");
 script_bugtraq_id(22211);

 script_name(english:"Cisco Multiple Devices Crafted IP Option Remote Code Execution (CSCeh52410)");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote CISCO device." );
 script_set_attribute(attribute:"description", value:
"The remote version of IOS contains a flaw that could cause the remote
router to crash when processing specially malformed IP packets.

An attacker might use these flaws to execute arbitrary code on the remote
routers." );
 script_set_attribute(attribute:"solution", value:
"http://www.nessus.org/u?f4359412" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2007/03/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/01/24");
 script_cvs_date("Date: 2018/06/27 18:42:25");
script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
script_end_attributes();


 summary["english"] = "Uses SNMP to determine if a flaw is present";
 script_summary(english:summary["english"]);

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");

 script_family(english:"CISCO");

 script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl");
 script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model");
 exit(0);
}


include('cisco_func.inc');

os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);
version = extract_version(os);
if ( ! version ) exit(0);



if ( deprecated_version(version, "12.0", "12.0DA", "12.0DB", "12.0DC", "12.0SC", "12.0SL", "12.0SP", "12.0ST", "12.0T", "12.0WT", "12.0XA", "12.0XB", "12.0XC", "12.0XD", "12.0XE", "12.0XG", "12.0XH", "12.0XI", "12.0XJ", "12.0XK", "12.0XL", "12.0XM", "12.0XN", "12.0XQ", "12.0XR", "12.0XS", "12.0XV", "12.0XW") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(27)S3", "12.0(28)S"),
		   newest:"12.0(28)S") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(25)SX11", "12.0(30)SX"),
		   newest:"12.0(30)SX") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(27)SY"),
		   newest:"12.0(27)SY") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(30)SZ"),
		   newest:"12.0(30)SZ") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(28)W5(32b)"),
		   newest:"12.0(28)W5(32b)") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.0(5)WC15"),
		   newest:"12.0(5)WC15") ) vuln ++;

# 12.1
if ( deprecated_version(version, "12.1", "12.1AA", "12.1AX", "12.1AY", "12.1AZ", "12.1CX", "12.1DA", "12.1DB", "12.1DC", "12.1EC", "12.1EU", "12.1EV", "12.1EW", "12.1EX", "12.1EY", "12.1EZ", "12.1T", "12.1XA", "12.1XB", "12.1XC", "12.1XD", "12.1XE", "12.1XF", "12.1XG", "12.1XH", "12.1XI", "12.1XJ", "12.1XL", "12.1XM", "12.1XP", "12.1XQ", "12.1XR", "12.1XS", "12.1XT", "12.1XU", "12.1XV", "12.1XW", "12.1XX", "12.1XY", "12.1XZ", "12.1YA", "12.1YB", "12.1YC", "12.1YD", "12.1YE", "12.1YF", "12.1YH", "12.1YI", "12.1YJ") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.1(23)E"),
		   newest:"12.1(23)E") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.1(22)EA8"),
		   newest:"12.1(22)EA8") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.1(23)EB"),
		   newest:"12.1(23)EB") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.1(19)EO6", "12.1(20)EO3"),
		   newest:"12.1(20)EO3") ) vuln ++;

# 12.2
if ( deprecated_version(version, "12.2B", "12.2BC", "12.2BW", "12.2BY", "12.2BZ", "12.2CX", "12.2CY", "12.2CZ", "12.2DD", "12.2DX", "12.2EU", "12.2JA", "12.2JK", "12.2MB", "12.2SU", "12.2SX", "12.2SXA", "12.2SY", "12.2SZ", "12.2T", "12.2TPC", "12.2XA", "12.2XB", "12.2XC", "12.2XD", "12.2XE", "12.2XF", "12.2XG", "12.2XH", "12.2XI", "12.2XJ", "12.2XK", "12.2XL", "12.2XM", "12.2XN", "12.2XQ", "12.2XR", "12.2XS", "12.2XT", "12.2XU", "12.2XV", "12.2XW", "12.2YA", "12.2YB", "12.2YC", "12.2YD", "12.2YE", "12.2YF", "12.2YG", "12.2YH", "12.2YJ", "12.2YK", "12.2YL", "12.2YM", "12.YN", "12.2YP", "12.2YQ", "12.2YR", "12.2YS", "12.2YT", "12.2YU", "12.2YV", "12.2YW", "12.2YX", "12.2YY", "12.2YZ", "12.2ZA", "12.2AB", "12.2ZC", "12.2ZD", "12.2ZE", "12.2ZF", "12.2ZG", "12.2ZH", "12.2ZJ", "12.2ZL", "12.2ZN", "12.2ZP") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(34a)", "12.2(37)"),
		   newest:"12.2(37)") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(10)DA5", "12.2(12)DA10"),
		   newest:"12.2(12)DA10") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(18)EW3", "12.2(20)EW4", "12.2(25)EW"),
		   newest:"12.2(25)EW") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(25)EX"),
		   newest:"12.2(25)EX") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(15)MC2h"),
		   newest:"12.2(15)MC2h") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(25)S"),
		   newest:"12.2(25)S") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(28)SB"),
		   newest:"12.2(28)SB") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(25)SE"),
		   newest:"12.2(25)SE") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(18)SO7"),
		   newest:"12.2(18)SO7") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(23)SV"),
		   newest:"12.2(23)SV") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.2(25)SW1"),
		   newest:"12.2(25)SW1") ) vuln ++;

if ( "SXB" >< version &&
     check_release(version:version,
		   patched:make_list("12.2(17d)SXB11a"),
		   newest:"12.2(17d)SXB11a") ) vuln ++;

if ( "SXD" >< version &&
     check_release(version:version,
		   patched:make_list("12.2(18)SXD7a"),
		   newest:"12.2(18)SXD7a") ) vuln ++;

# 12.3 
if ( deprecated_version(version, "12.3B", "12.3BW", "12.3XB", "12.3XD", "12.3XE", "13.3XF", "12.3XG", "12.3XH", "12.3XJ", "12.3XK", "12.3XQ") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(8)"),
		   newest:"12.3(8)") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(9a)BC"),
		   newest:"12.3(9a)BC") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(2)JK2", "12.3(8)JK"),
		   newest:"12.3(8)JK") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(7)JX6", "12.3(11)JX"),
		   newest:"12.3(11)JX") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(4)T13", "12.3(8)T"),
		   newest:"12.3(8)T") ) vuln ++;

if ( "TPC" >< version &&
     check_release(version:version,
		   patched:make_list("12.3(4)TPC11b"),
		   newest:"12.3(4)TPC11b") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(2)XA6"),
		   newest:"12.3(2)XA6") ) vuln ++;

if ( check_release(version:version,
		   patched:make_list("12.3(7)XI8"),
		   newest:"12.3(7)XI8") ) vuln ++;


if ( vuln == 1 ) security_hole(port:161, proto:"udp");
else if ( vuln > 1 ) display("IOS version ", version, " identified as vulnerable by multiple checks\n");
VendorProductVersionCPE
ciscoioscpe:/o:cisco:ios