Vulnerability Note VU#689326
Cisco IOS vulnerable to DoS via malformed BGP packet
A vulnerability in Cisco's Internetwork Operating System (IOS) could result in a remotely exploitable denial of service.
Cisco Internetwork Operating System (IOS) includes support for Border Gateway Protocol (BGP), which is defined in RFC 1771. BGP is designed to exchange network reachability information between peer nodes. Information advertised by a BGP system to its peers includes timers, metrics, and paths to different Autonomous System (AS) networks. Routing between AS networks depends on BGP, and the Internet is a network of AS networks. Therefore, vulnerabilities in BGP have the potential to affect the Internet infrastructure.
A Cisco device running IOS that is enabled for BGP is vulnerable to a denial-of-service attack via a malformed BGP packet. The specific nature of the crafted packets exploiting this vulnerability is not known. IOS is vulnerable only if the device is set up with the bgp log-neighbor-changes command.
By sending a specially crafted BGP packet to an affected device, a remote attacker could cause the device to reload. Repeated exploitation of this vulnerability could result in a denial-of-service condition. Because BGP must be configured to accept traffic from an explicitly defined peer, exploitation would be difficult from an untrusted host.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cisco Systems Inc.||Affected||-||26 Jan 2005|
CVSS Metrics (Learn More)
Thanks to Cisco PSIRT for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: Unknown
- Date Public: 26 Jan 2005
- Date First Published: 26 Jan 2005
- Date Last Updated: 26 Jan 2005
- Severity Metric: 12.13
- Document Revision: 11
If you have feedback, comments, or additional information about this vulnerability, please send us email.