Guest

Cisco Security

Cisco Security

ICMPv6 option type 4 violation

 
Signature ID: 1604/0
Original Release:S182
Release:S582 (download)
Original Release Date:2005 July 25
Latest Release Date:2011 July 14
Default Enabled:False
Default Retired:True
Alarm Severity:Medium
Fidelity:75 

Description

This alert will trigger when an ICMPv6 option violation isseen in an IPv6 packet. The ICMPv6 layer will be decodedin an IPv6 packet following optional extension and fragmentheaders.RFC 2461 specifies legal ICMPv6 options for NetworkDiscovery messages. Violation of these protocol ruleswill result in this alert.All Network Discovery messages are examined for malformedoptions. Other ICMPv6 message types are not examined.This sig, 1604, denotes an option in the packet does notconform to the length rules for a Redirect Headeroption.Contents of a typical include: 1) Src and Dst addresses are the lower 4 octets of the IPv6 address. 1) Src and Dst IPv6 address (16 octets each). 2) optional Length - the length of the malformed option. 3) optional Count - the number of occurrences of a condition.

Recommended Filter

There are no suggested filters.

Benign Triggers

There are no known benign triggers.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
9534Cisco IOS Malformed IPv6 Packet Vulnerability42005 August 04 15:17 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield