The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Cisco Catalyst: denial of service via MPLS

Synthesis of the vulnerability 

A local network attacker can send a malicious MPLS packet in order to stop hardware.
Vulnerable products: Cisco Catalyst.
Severity of this weakness: 1/4.
Creation date: 28/02/2007.
Références of this bulletin: 81865, 82202, BID-22750, cisco-sa-20070228-mpls, CSCef90002, CSCsd37415, CVE-2007-1258, VIGILANCE-VUL-6594.

Description of the vulnerability 

An attacker can generate a vulnerability in:
 - Cisco Catalyst 6500, IOS version 12.2(18)SXF4 with Cisco IOS Software Modularity
 - Cisco Catalyst 6000, 6500 7600 with MSFC2 or MSFC3 (Multilayer Switch Feature Card) which runs in Hybrid Mode (CatOS on Supervisor Engine and IOS on MSFC)

When these products receive a malicious MPLS packet, even if MPLS is not configured, an error occurs and leads to a denial of service. To exploit this vulnerability, attacker has to be located on the local network.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer threat alert impacts software or systems such as Cisco Catalyst.

Our Vigil@nce team determined that the severity of this weakness announce is low.

The trust level is of type confirmed by the editor, with an origin of LAN.

An attacker with a expert ability can exploit this computer weakness bulletin.

Solutions for this threat 

Cisco Catalyst: version for MPLS.
Cisco's announces indicate corrected versions and workarounds.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer vulnerabilities watch and alert. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.