Plugin ID | 25 |
Plugin name | Cisco 645 http get Denial of Service |
Plugin filename | Cisco 675 http get Denial of Service.plugin |
Plugin filesize | 3169 bytes |
Plugin family | Network devices |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2003/11/14 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.5 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.5 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send GET ?\n\n|sleep 5|close|icmp_alive |
Plugin exploit accuracy | 50 |
Plugin comment | Using this plugin can cause a denial of service of affected systems. Use this plugin with cause. |
Bug advisory | http://online.securityfocus.com/archive/1/147562 |
Bug produced name | Cisco Systems |
Bug produced email | info at cisco dot com |
Bug produced web | http://www.cisco.com |
Bug affected | Cisco 645 |
Bug not affected | Other Cisco and network devices |
Bug vulnerability class | Denial Of Service |
Bug description | The Cisco 675 is vulnerable to a remote Denial of Service attack. An attacker may crash the device by sending the HTTP request "GET ?" to the HTTP port tcp/80 of the router. You need to reboot the device to make it work again. |
Bug solution | Upgrade your Cisco firmware and filter incoming traffic on port tcp/80. As workaround (disabling the web service) you could add the rule "set web disabled", "write" and "reboot" into your device. |
Bug fixing time | 20 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.nessus.org |
Bug remote | Yes |
Bug local | No |
Bug severity | High |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 8 |
Bug risk | 7 |
Bug Nessus risk | High |
Bug check tools | Nessus is also able to do the same check. |
Source CVE | CVE-2001-0058 |
Source OSVDB ID | 460 |
Source Nessus ID | 10561 |
Source ISS X-Force ID | 5626 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.cisco.com/warp/public/707/CBOS-multiple.shtml |