Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Cisco IOS Interface Denial of Service Vulnerability SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Cisco IOS Interface Denial of Service Vulnerability

Cisco announced a critical infrastructure vulnerability concerning the IOS software which is widely deployed as a network operating system on routers and switches.

A working exploit has been posted to public mailing lists. It has been reported
that the exploit code was used in some attacks. However, so far we don't see any
widespread usage. Sporadic network outages over the last two days can be attributed to network operators upgrading routers.

Cisco IOS is deployed on many routers involved in the Internet infrastructure. A specially crafted sequence of IPv4 packets could cause an error on router interfaces where the interface will incorrectly mark the interface as having a full queue and block inbound traffic to that interface. The effected router has to be rebooted to resume operation.


A large number of ISPs and end users is using effected equipment. Large internet service providers already upgraded many routers. As a side effect, internet users may have experienced outages due to the maintenance work. Some of these outages are reflected in the 'global instability index' which is maintained by Dennis McGrath (Univ. Dartmouth): . The
measured BGB route flapping occurs as ISPs reroute traffic temporarily while some routers are down for upgrades.


More details are available from Cisco on this vulnerability and potential fixes or work arounds.

Contributed by the SANS Incident Handlers (isc at incidents dot org)

76 Posts
Jul 18th 2003

Sign Up for Free or Log In to start participating in the conversation!