MD5 Neighbor Authentication in Extended Interior Gateway Routing Protocol (EIGRP) 1.2, as implemented in Cisco IOS 11.3 and later, does not include the Message Authentication Code (MAC) in the checksum, which allows remote attackers to sniff message hashes and (1) replay EIGRP HELLO messages or (2) cause a denial of service by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
MD5 Neighbor Authentication in Extended Interior Gateway Routing Protocol (EIGRP) 1.2, as implemented in Cisco IOS 11.3 and later, does not include the Message Authentication Code (MAC) in the checksum, which allows remote attackers to sniff message hashes and (1) replay EIGRP HELLO messages or (2) cause a denial of service by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.vupen.com/english/advisories/2005/3008 | vdb-entry x_refsource_VUPEN |
http://www.securityfocus.com/archive/1/419830/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/bid/15970 | vdb-entry x_refsource_BID |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5741 | vdb-entry signature x_refsource_OVAL |
http://www.securityfocus.com/archive/1/419898/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://securityreason.com/securityalert/274 | third-party-advisory x_refsource_SREASON |
http://marc.info/?l=full-disclosure&m=113504451523186&w=2 | mailing-list x_refsource_FULLDISC |
http://securitytracker.com/id?1015382 | vdb-entry x_refsource_SECTRACK |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040332.html | mailing-list x_refsource_FULLDISC |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.vupen.com/english/advisories/2005/3008 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.securityfocus.com/archive/1/419830/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/bid/15970 | vdb-entry x_refsource_BID x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5741 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.securityfocus.com/archive/1/419898/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://securityreason.com/securityalert/274 | third-party-advisory x_refsource_SREASON x_transferred |
http://marc.info/?l=full-disclosure&m=113504451523186&w=2 | mailing-list x_refsource_FULLDISC x_transferred |
http://securitytracker.com/id?1015382 | vdb-entry x_refsource_SECTRACK x_transferred |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040332.html | mailing-list x_refsource_FULLDISC x_transferred |
MD5 Neighbor Authentication in Extended Interior Gateway Routing Protocol (EIGRP) 1.2, as implemented in Cisco IOS 11.3 and later, does not include the Message Authentication Code (MAC) in the checksum, which allows remote attackers to sniff message hashes and (1) replay EIGRP HELLO messages or (2) cause a denial of service by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |