Cisco IOS Mobile IP and Mobile IPv6 denial of service

ios-mobile-dos (49424) The risk level is classified as MediumMedium Risk

Description:

Cisco IOS is vulnerable to a denial of service, caused by multiple unspecified errors when the Mobile IPv6 or Mobile IP NAT Traversal feature is enabled. By sending specially-crafted MIPv6 packets, a remote attacker could exploit this vulnerability to cause the device to stop processing traffic.

*CVSS:

Base Score: 7.8
  Access Vector: Network
  Access Complexity: Low
  Authentication: None
  Confidentiality Impact: None
  Integrity Impact: None
  Availability Impact: Complete
 
Temporal Score: 5.8
  Exploitability: Unproven
  Remediation Level: Official-Fix
  Report Confidence: Confirmed

Consequences:

Denial of Service

Remedy:

Refer to cisco-sa-20090325-mobileip for patch, upgrade or suggested workaround information. See References.

References:

  • cisco-sa-20090325-mobileip: Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities.
  • BID-34241: Cisco IOS Mobile IP/Mobile IPv6 Multiple Denial of Service Vulnerablities
  • CVE-2009-0633: Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
  • OSVDB ID: 53128: Cisco IOS Mobile IPv6 Subsystem MIPv6 Packet Handling Remote DoS
  • OSVDB ID: 53129: Cisco IOS Mobile IP NAT Traversal MIPv6 Packet Handling Remote DoS
  • SA34438: Cisco IOS Multiple Vulnerabilities
  • SECTRACK ID: 1021898: Cisco IOS Mobile IP NAT or Mobile IPv6 Inteface Blocking Flaw Lets Remote Users Deny Service

Platforms Affected:

  • Cisco IOS 12.3
  • Cisco IOS 12.3 BC
  • Cisco IOS 12.3 BW
  • Cisco IOS 12.3 JK
  • Cisco IOS 12.3 B
  • Cisco IOS 12.3 Jec
  • Cisco IOS 12.3 Jea
  • Cisco IOS 12.3 Jeb
  • Cisco IOS 12.3 EU
  • Cisco IOS 12.3 JA
  • Cisco IOS 12.3 JX
  • Cisco IOS 12.3 XD
  • Cisco IOS 12.3 T
  • Cisco IOS 12.3 XC
  • Cisco IOS 12.3 Tpc
  • Cisco IOS 12.3 JL
  • Cisco IOS 12.3 VA
  • Cisco IOS 12.3 XE
  • Cisco IOS 12.3 XB
  • Cisco IOS 12.3 XA
  • Cisco IOS 12.3 XI
  • Cisco IOS 12.3 XJ
  • Cisco IOS 12.3 XH
  • Cisco IOS 12.3 XG
  • Cisco IOS 12.3 XR
  • Cisco IOS 12.3 XQ
  • Cisco IOS 12.3 XK
  • Cisco IOS 12.3 XS
  • Cisco IOS 12.3 XU
  • Cisco IOS 12.3 XF
  • Cisco IOS 12.3 YK
  • Cisco IOS 12.3 YJ
  • Cisco IOS 12.3 YI
  • Cisco IOS 12.3 YA
  • Cisco IOS 12.3 XY
  • Cisco IOS 12.3 XW
  • Cisco IOS 12.3 YH
  • Cisco IOS 12.3 YG
  • Cisco IOS 12.3 YF
  • Cisco IOS 12.3 YD
  • Cisco IOS 12.3 YM
  • Cisco IOS 12.3 YU
  • Cisco IOS 12.3 YT
  • Cisco IOS 12.3 YS
  • Cisco IOS 12.3 YQ
  • Cisco IOS 12.3 YX
  • Cisco IOS 12.3 YZ
  • Cisco IOS 12.4
  • Cisco IOS 12.4 XK
  • Cisco IOS 12.4 MR
  • Cisco IOS 12.4 SW
  • Cisco IOS 12.4 JA
  • Cisco IOS 12.4 JK
  • Cisco IOS 12.4 Jma
  • Cisco IOS 12.4 Jmb
  • Cisco IOS 12.4 Jmc
  • Cisco IOS 12.4 JX
  • Cisco IOS 12.4 T
  • Cisco IOS 12.4 XA
  • Cisco IOS 12.4 XB
  • Cisco IOS 12.4 XC
  • Cisco IOS 12.4 XD
  • Cisco IOS 12.4 XF
  • Cisco IOS 12.4 XE
  • Cisco IOS 12.4 XJ
  • Cisco IOS 12.4 XG
  • Cisco IOS 12.4 MD

Reported:

Mar 25, 2009

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page