ID
VAR-E-200406-0084
CVE
cve_id: | CVE-2004-0589 | Trust: 0.3 |
TITLE
Cisco IOS Border Gateway Protocol Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
The problem presents itself when an affected device handles a malformed or invalid Border Gateway Protocol (BGP) packet. During processing the offending packet the affected device will reset.
It should be noted that this issue only affects devices with BGP enabled; BGP is not enabled by default. It has been reported that this issue would be very difficult to exploit as it would require injecting malicious packets into communication between trusted peers.
An attacker may exploit this issue to cause the affected device to reset, taking several minutes to become functional. It is possible to create a persistent denial of service condition by continually transmitting malformed packets to the affected device.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zb | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2za | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yx | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yr | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yp | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2xq | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2xk | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2sz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2ja | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2dx | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2cx | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.1t | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0t | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0sz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2su | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2dd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ey | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ev | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1eo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ec | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1eb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ea | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1db | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1az | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1aa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0wx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0w5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0st | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.0 | Trust: 0.3 |
vendor: | cisco | model: | ios 11.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 11.2sa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 11.2p | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 11.1ca | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 11.1aa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yj | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ax | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xu | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xp | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0wc | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 11.2sa | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.2(16) | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Discovery is credited to Cisco and researchers at the University of California at Santa Barbara.
Trust: 0.3
EXTERNAL IDS
db: | CERT/CC | id: | VU#784540 | Trust: 0.3 |
db: | NVD | id: | CVE-2004-0589 | Trust: 0.3 |
db: | BID | id: | 10560 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/iacl.html | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/sw/iosswrel/ps1828/products_configuration_guide_chapter09186a00800ca571.html | Trust: 0.3 |
url: | http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/784540 | Trust: 0.3 |
SOURCES
db: | BID | id: | 10560 |
LAST UPDATE DATE
2022-07-27T09:20:50.596000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 10560 | date: | 2016-07-06T13:19:00 |
SOURCES RELEASE DATE
db: | BID | id: | 10560 | date: | 2004-06-16T00:00:00 |