Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DOS:NETDEV:ASCEND-KILL

Severity

High

Recommended

No

Recommended Action

Drop

Category

DOS

Keywords

Ascend Router

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DOS: Ascend Router


This signature detects attempts to exploit a known software vulnerability in Lucent routers. Versions up to and including MAX Router 5.0, Pipeline Router 6.0, and TNT Router 2.0 are susceptible. Attackers can send malformed packets to UDP/9 (Discard), causing the software to crash.

Extended Description

Certain versions of Ascends (Lucent) router software listen on port 9 (UDP Discard). Ascend provides configuration tools for MAX and Pipeline routers that locate locally installed routers by broadcasting a specially formatted packet to UDP port 9. An attacker can send a similar but malformed packet to the same port that will cause MAX and Pipeline routers running certain software versions to crash.

Affected Products

  • Lucent Ascend MAX Router 1.0.0
  • Lucent Ascend MAX Router 2.0.0
  • Lucent Ascend MAX Router 3.0.0
  • Lucent Ascend MAX Router 4.0.0
  • Lucent Ascend MAX Router 5.0.0
  • Lucent Ascend Pipeline Router 1.0.0
  • Lucent Ascend Pipeline Router 2.0.0
  • Lucent Ascend Pipeline Router 3.0.0
  • Lucent Ascend Pipeline Router 4.0.0
  • Lucent Ascend Pipeline Router 5.0.0
  • Lucent Ascend Pipeline Router 6.0.0
  • Lucent Ascend TNT Router 1.0.0
  • Lucent Ascend TNT Router 2.0.0

References

  • BugTraq: 714
  • CVE: CVE-1999-0060
  • URL: http://ciac.llnl.gov/ciac/bulletins/i-038.shtml

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out