Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DOS:NETDEV:CISCO-TELNET-BOF1

Severity

Medium

Recommended

No

Category

DOS

Keywords

Cisco Telnet Buffer Overflow

Release Date

2004/03/31

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DOS: Cisco Telnet Buffer Overflow


This signature detects attempts to exploit a known vulnerability against Cisco CBOS. CBOS versions earlier than 2.4.5 are vulnerable. Attackers can send overly large packets to the CBOS telnet daemon to cause a denial of service on the Cisco device.

Extended Description

CBOS (Cisco Broadband Operating System) is the operating system for Cisco 600 series routers. It is possible for a remote user to cause a denial of service of a CPE running CBOS software 2.4.4 and prior. Sending an unusually large packet to the telnet port will exploit this issue. The following devices in the Cisco 600 series of routers are affected by this issue: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678. This vulnerability has been assigned Cisco Bug ID CSCdv50135.

Affected Products

  • Cisco CBOS 2.0.1
  • Cisco CBOS 2.1.0
  • Cisco CBOS 2.1.0 a
  • Cisco CBOS 2.2.0
  • Cisco CBOS 2.2.1
  • Cisco CBOS 2.2.1 a
  • Cisco CBOS 2.3.0
  • Cisco CBOS 2.3.0 .053
  • Cisco CBOS 2.3.2
  • Cisco CBOS 2.3.5
  • Cisco CBOS 2.3.5 .015
  • Cisco CBOS 2.3.7
  • Cisco CBOS 2.3.7 .002
  • Cisco CBOS 2.3.8
  • Cisco CBOS 2.3.9
  • Cisco CBOS 2.4.1
  • Cisco CBOS 2.4.2
  • Cisco CBOS 2.4.2 ap
  • Cisco CBOS 2.4.2 b
  • Cisco CBOS 2.4.3
  • Cisco CBOS 2.4.4

References

  • BugTraq: 4814
  • CVE: CVE-2002-0886
  • URL: http://www.cisco.com/warp/public/707/CBOS-DoS.shtml

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out