{"vuid":"VU#217912","idnumber":"217912","name":"Cisco IOS fails to properly process TCP packets","keywords":["Cisco","IOS","Transmission Control Protocol listener","DoS","denial of service","memory leak","TCP"],"overview":"The Cisco IOS Transmission Control Protocol listener contains a memory leak.","clean_desc":"Cisco IOS is an operating system that is used on Cisco network devices. The Cisco IOS software can run Transmission Control Protocol (TCP) servers that allow administrators to connect to the devices for management or monitoring purposes. A vulnerability exists in the IOS TCP listener. An attacker may be able to craft an IPv4 TCP packet that causes IOS to leak memory when processed. An attacker may be able to exploit this vulnerability to create a denial-of-service condition. The specially crafted TCP can be delivered outside the context of a fully established TCP 3-way handshake.","impact":"A remote, unauthenticated attacker with the ability to supply specially crafted TCP packets could cause memory to leak in the affected service. Sustained exploitation could eventually cause a denial of service due to shortage of memory in the affected device and would require a system reset to recover. An attacker could send spoofed TCP packets to trigger this vulnerability making an attack harder to detect or stop. Note that Cisco states that this vulnerability only applies to traffic destined to the affected device. Traffic transiting the device will not trigger this vulnerability.","resolution":"Upgrade\nSee the Software Version and Fixes section of Cisco Security Advisory 200701 for information on available upgrades.","workarounds":"Restrict Access Restricting public access to TCP servers running on vulnerable systems may mitigate this vulnerability. Access control lists, management VLANs, or alternate connection methods such as modem or console ports can be used to allow restricted access to the device. Disable Services Disabling all services that accept incoming TCP connections on a vulnerable device may prevent this vulnerability from being exploited. For more information about these and other workarounds, see the Workarounds section of Cisco Security Advisory 20070124.","sysaffected":"","thanks":"Thanks to Cisco for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20070124-crafted-tcp.shtml","http://www.cisco.com/univercd/cc/td/doc/product/lan/c2900xl/29_35wc/sc/swgvlans.htm#xtocid119662","http://cio.cisco.com/warp/public/707/4.html#probdescrip","http://www.cisco.com/warp/public/76/9.html#intro","http://www.cisco.com/en/US/products/products_security_response09186a00807cb119.html","http://www.cisco.com/warp/public/707/cisco-sa-20070124-crafted-tcp.shtml#workarounds","http://www.cisco.com/warp/public/707/cisco-sa-20070124-bundle.shtml","http://tools.ietf.org/html/rfc791","http://en.wikipedia.org/wiki/Cisco_IOS","http://en.wikipedia.org/wiki/Access_control_list","http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment","http://secunia.com/advisories/23867/","http://www.securityfocus.com/bid/22208"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-24T16:56:59Z","publicdate":"2007-01-24T00:00:00Z","datefirstpublished":"2007-01-24T20:33:48Z","dateupdated":"2007-02-02T19:51:00Z","revision":40,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"12","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"4","cam_impact":"14","cam_easeofexploitation":"14","cam_attackeraccessrequired":"16","cam_scorecurrent":"7.5264","cam_scorecurrentwidelyknown":"9.408","cam_scorecurrentwidelyknownexploited":"14.112","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.5264,"vulnote":null}