27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2197 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

<strong>PVS</strong> ID: 2198 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very<br />

specific circumstances and only with certain IP host implementations, allow unauthorized<br />

packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi36962.<br />

Solution: http://www.cisco.com/warp/public/707/1.html<br />

CVE-1999-0161<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

<strong>PVS</strong> ID: 2199 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very<br />

specific circumstances and only with certain IP host implementations, allow unauthorized<br />

packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi36962.<br />

Solution: http://www.cisco.com/warp/public/707/1.html<br />

CVE-1999-0161<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2200 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Family Internet Services 550

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!