Cisco IOS 12.0.2 - Syslog Crash

Author: Olaf Selke
type: dos
platform: hardware
port: 
date_added: 1999-01-11  
date_updated: 2012-07-02  
verified: 1  
codes: CVE-1999-0063;OSVDB-1089  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 19531.txt  
source: https://www.securityfocus.com/bid/675/info

Cisco devices running classic IOS are reported prone to a denial of service vulnerability. The issue occurs when a vulnerable device receives and processes a UDP packet on UDP port 514 for syslog. This issue results in a crash or hang requiring a reboot.

Vulnerable IOS software may be found on the following Cisco devices:

- Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 8xx, ubr9xx, 1xxx, 25xx, 26xx, 30xx, 36xx, 38xx, 40xx, 45xx, 47xx, AS52xx, AS53xx, AS58xx, 64xx, 70xx, 72xx (including the ubr72xx), 75xx, and 12xxx series.
-Recent versions of LS1010 ATM switch.
-Catalyst 2900XL LAN switch.
-Cisco DitributedDirector.

nmap -sU -p514 <IP-of-Cisco-device>