ID CVE-2009-1168
Summary Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021.
References
Vulnerable Configurations
  • cpe:2.3:o:cisco:ios:12.0\(32\)s12:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(32\)s12:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.0\(32\)s13:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(32\)s13:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.0\(32\)sy8:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(32\)sy8:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.0\(32\)sy9:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(32\)sy9:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.0\(33\)s3:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(33\)s3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.0\(33\)s4:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.0\(33\)s4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.2\(33\)sxi1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.2\(33\)sxi1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.2\(33\)sxi2:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.2\(33\)sxi2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios:12.4\(24\)t1:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:12.4\(24\)t1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 29-09-2017 - 01:34)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-04-22T04:00:15.104-04:00
class vulnerability
contributors
  • name KASHIF LATIF
    organization DTCC
  • name Shane Shaffer
    organization G2, Inc.
description Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021.
family ios
id oval:org.mitre.oval:def:6697
status accepted
submitted 2010-05-12T12:00:00.000-04:00
title Cisco IOS Software BGP Routing Dos Vulnerability
version 10
refmap via4
bid 35862
cisco 20090729 Cisco IOS Software Border Gateway Protocol 4-Byte Autonomous System Number Vulnerabilities
sectrack 1022619
secunia 36046
vupen ADV-2009-2082
Last major update 29-09-2017 - 01:34
Published 30-07-2009 - 18:30
Last modified 29-09-2017 - 01:34
Back to Top