Guest

Cisco Security

Cisco Security

ICMPv6 option type 5 violation

 
Signature ID: 1605/0
Original Release:S182
Release:S230 (download)
Original Release Date:2005 July 25
Latest Release Date:2006 June 05
Default Enabled:True
Default Retired:False
CVE:CVE-2005-2451
Alarm Severity:Medium
Fidelity:75 

Description

This alert will trigger when an ICMPv6 option violation is seen in an IPv6 packet. The ICMPv6 layer will be decoded in an IPv6 packet following optional extension and fragment headers. RFC 2461 specifies legal ICMPv6 options for Network Discovery messages. Violation of these protocol rules will result in this alert. All Network Discovery messages are examined for malformed options. Other ICMPv6 message types are not examined. This sig, 1605, denotes an option in the packet does not conform to the length rules for a MTU option. Contents of a typical include: 1) Src and Dst addresses are the lower 4 octets of the IPv6 address. 1) Src and Dst IPv6 address (16 octets each). 2) optional Length - the length of the malformed option. 3) optional Count - the number of occurrences of a condition. This signature is only available on 5.0.4 or greater platforms.

Recommended Filter

There are no suggested filters.

Benign Triggers

There are no known benign triggers.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
9534Cisco IOS Malformed IPv6 Packet Vulnerability42005 August 04 15:17 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield