Cisco IOS SSH Large Packet CPU Consumption DoS

2002-06-27T16:00:00
ID OSVDB:5029
Type osvdb
Reporter Cisco Product Security Incident Response Team (PSIRT)(psirt@cisco.com)
Modified 2002-06-27T16:00:00

Description

Vulnerability Description

Cisco IOS contains a flaw that may allow a remote resource consumption denial of service. The issue is triggered when a device running SSH is sent a large packet designed to exploit the SSH CRC32 vulnerability in which attackers can execute arbitrary commands using an integer overflow, and will result in loss of availability for the platform.

Solution Description

Follow the instructions in the Vendor Specific Solution URL to determine the proper upgrade for the device, as this has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): disable the SSH service on the device

Short Description

Cisco IOS contains a flaw that may allow a remote resource consumption denial of service. The issue is triggered when a device running SSH is sent a large packet designed to exploit the SSH CRC32 vulnerability in which attackers can execute arbitrary commands using an integer overflow, and will result in loss of availability for the platform.

References:

Vendor Specific Solution URL: http://www.cisco.com/warp/public/707/SSH-scanning.shtml#Software Vendor Specific Advisory URL Related OSVDB ID: 795 Nessus Plugin ID:11381 Nessus Plugin ID:11382 ISS X-Force ID: 9437 Generic Exploit URL: http://www1.corest.com/common/showdoc.php?idxseccion=10&idx=81 CVE-2002-1024 CVE-2001-0144 CERT VU: 290140 Bugtraq ID: 5114