Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DOS:NETDEV:ASCEND-KILL2

Severity

High

Recommended

No

Recommended Action

Drop

Category

DOS

Keywords

Ascend Router (2)

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DOS: Ascend Router (2)


This signature detects attempts to exploit a known vulnerability against Lucent routers. MAX Router 5.0, Pipeline Router 6.0, TNT Router 2.0, and all earlier versions are vulnerable. Attackers can send malformed packets to UDP/9 (Discard) to cause a denial of service (DoS) or crash the software.

Extended Description

Certain versions of Ascends (Lucent) router software listen on port 9 (UDP Discard). Ascend provides configuration tools for MAX and Pipeline routers that locate locally installed routers by broadcasting a specially formatted packet to UDP port 9. An attacker can send a similar but malformed packet to the same port that will cause MAX and Pipeline routers running certain software versions to crash.

Affected Products

  • Lucent Ascend MAX Router 1.0.0
  • Lucent Ascend MAX Router 2.0.0
  • Lucent Ascend MAX Router 3.0.0
  • Lucent Ascend MAX Router 4.0.0
  • Lucent Ascend MAX Router 5.0.0
  • Lucent Ascend Pipeline Router 1.0.0
  • Lucent Ascend Pipeline Router 2.0.0
  • Lucent Ascend Pipeline Router 3.0.0
  • Lucent Ascend Pipeline Router 4.0.0
  • Lucent Ascend Pipeline Router 5.0.0
  • Lucent Ascend Pipeline Router 6.0.0
  • Lucent Ascend TNT Router 1.0.0
  • Lucent Ascend TNT Router 2.0.0

References

  • BugTraq: 714
  • CVE: CVE-1999-0060
  • URL: http://ciac.llnl.gov/ciac/bulletins/i-038.shtml

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out