search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco IOS vulnerable to DoS via malformed BGP packet

Vulnerability Note VU#689326

Original Release Date: 2005-01-26 | Last Revised: 2005-01-26

Overview

A vulnerability in Cisco's Internetwork Operating System (IOS) could result in a remotely exploitable denial of service.

Description

Cisco Internetwork Operating System (IOS) includes support for Border Gateway Protocol (BGP), which is defined in RFC 1771. BGP is designed to exchange network reachability information between peer nodes. Information advertised by a BGP system to its peers includes timers, metrics, and paths to different Autonomous System (AS) networks. Routing between AS networks depends on BGP, and the Internet is a network of AS networks. Therefore, vulnerabilities in BGP have the potential to affect the Internet infrastructure.

A Cisco device running IOS that is enabled for BGP is vulnerable to a denial-of-service attack via a malformed BGP packet. The specific nature of the crafted packets exploiting this vulnerability is not known. IOS is vulnerable only if the device is set up with the bgp log-neighbor-changes command.

Impact

By sending a specially crafted BGP packet to an affected device, a remote attacker could cause the device to reload. Repeated exploitation of this vulnerability could result in a denial-of-service condition. Because BGP must be configured to accept traffic from an explicitly defined peer, exploitation would be difficult from an untrusted host.

Solution

Apply a patch or upgrade
Please refer to the "Software Versions and Fixes" section of the Cisco Security Advisory for more information on upgrading.


Workarounds

Cisco recommends a number of workarounds. For a complete list of workarounds, see the "Workarounds" section of the Cisco Security Advisory.

Vendor Information

689326
 

Cisco Systems Inc. Affected

Updated:  January 26, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Cisco Advisory "Cisco IOS Misformed BGP Packet Causes Reload"

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Cisco PSIRT for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: None
Severity Metric: 12.13
Date Public: 2005-01-26
Date First Published: 2005-01-26
Date Last Updated: 2005-01-26 16:51 UTC
Document Revision: 12

Sponsored by CISA.