Vigil@nce: Cisco IOS, denials of service of SSH
May 2008 by Vigil@nce
SYNTHESIS
A non authenticated attacker can create three denials of service
in the IOS SSH service.
Gravity: 3/4
Consequences: denial of service of service
Provenance: intranet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 21/05/2008
Identifier: VIGILANCE-VUL-7845
IMPACTED PRODUCTS
– Cisco IOS [confidential versions]
DESCRIPTION
The SSH service is generally enabled to remotely administer the
IOS. It is impacted by three denials of service.
A non authenticated attacker can send SSHv2 packets in order to
generate an error. [grav:3/4; CSCsk42419]
A non authenticated attacker can send SSHv2 packets in order to
generate an error. [grav:3/4; CSCsk60020]
A non authenticated attacker can send packets in order to generate
an error. [grav:3/4; CSCsh51293]
These errors can force the IOS to reload.
CHARACTERISTICS
Identifiers: 99725, BID-29314, cisco-sa-20080521-ssh, CSCsh51293,
CSCsk42419, CSCsk60020, CVE-2008-1159, VIGILANCE-VUL-7845