CVE-2003-0567 - Improper Input Validation

Severity

78%

Complexity

99%

Confidentiality

115%

Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.

Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.

CVSS 2.0 Base Score 7.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C).

Demo Examples

Improper Input Validation

CWE-20

This example demonstrates a shopping interaction in which the user is free to specify the quantity of items to be purchased and a total is calculated.


               
...

The user has no control over the price variable, however the code does not prevent a negative value from being specified for quantity. If an attacker were to provide a negative value, then the user would have their account credited instead of debited.

Improper Input Validation

CWE-20

This example asks the user for a height and width of an m X n game board with a maximum dimension of 100 squares.


               
.../* board dimensions */
die("No integer passed: Die evil hacker!\n");
die("No integer passed: Die evil hacker!\n");
die("Value too large: Die evil hacker!\n");

While this code checks to make sure the user cannot specify large, positive integers and consume too much memory, it does not check for negative values supplied by the user. As a result, an attacker can perform a resource consumption (CWE-400) attack against this program by specifying two, large negative values that will not overflow, resulting in a very large memory allocation (CWE-789) and possibly a system crash. Alternatively, an attacker can provide very large negative values which will cause an integer overflow (CWE-190) and unexpected behavior will follow depending on how the values are treated in the remainder of the program.

Improper Input Validation

CWE-20

The following example shows a PHP application in which the programmer attempts to display a user's birthday and homepage.


               
echo "Birthday: $birthday<br>Homepage: <a href=$homepage>click here</a>"

The programmer intended for $birthday to be in a date format and $homepage to be a valid URL. However, since the values are derived from an HTTP request, if an attacker can trick a victim into clicking a crafted URL with <script> tags providing the values for birthday and / or homepage, then the script will run on the client's browser when the web server echoes the content. Notice that even if the programmer were to defend the $birthday variable by restricting input to integers and dashes, it would still be possible for an attacker to provide a string of the form:


               
2009-01-09--

If this data were used in a SQL statement, it would treat the remainder of the statement as a comment. The comment could disable other security-related logic in the statement. In this case, encoding combined with input validation would be a more useful protection mechanism.

Furthermore, an XSS (CWE-79) attack or SQL injection (CWE-89) are just a few of the potential consequences when input validation is not used. Depending on the context of the code, CRLF Injection (CWE-93), Argument Injection (CWE-88), or Command Injection (CWE-77) may also be possible.

Improper Input Validation

CWE-20

This function attempts to extract a pair of numbers from a user-supplied string.


               
}
die("Did not specify integer value. Die evil hacker!\n");
/* proceed assuming n and m are initialized correctly */

This code attempts to extract two integer values out of a formatted, user-supplied input. However, if an attacker were to provide an input of the form:


               
123:

then only the m variable will be initialized. Subsequent use of n may result in the use of an uninitialized variable (CWE-457).

Improper Input Validation

CWE-20

The following example takes a user-supplied value to allocate an array of objects and then operates on the array.


               
}
list[0] = new Widget();
die("Negative value supplied for list size, die evil hacker!");

This example attempts to build a list from a user-specified value, and even checks to ensure a non-negative value is supplied. If, however, a 0 value is provided, the code will build an array of size 0 and then try to store a new Widget in the first location, causing an exception to be thrown.

Improper Input Validation

CWE-20

This application has registered to handle a URL when sent an intent:


               
}......
}
}
int length = URL.length();
...

The application assumes the URL will always be included in the intent. When the URL is not present, the call to getStringExtra() will return null, thus causing a null pointer exception when length() is called.

Overview

Type

Cisco

First reported 21 years ago

2003-08-18 04:00:00

Last updated 6 years ago

2018-10-30 16:26:00

Affected Software

Cisco IOS 11.0

11.0

Cisco IOS 11.1

11.1

Cisco IOS 11.1 AA

11.1aa

Cisco IOS 11.1 CA

11.1ca

Cisco IOS 11.1CC

11.1cc

Cisco IOS 11.2

11.2

Cisco IOS 11.2P

11.2p

Cisco IOS 11.2 SA

11.2sa

Cisco IOS 11.3

11.3

Cisco IOS 11.3T

11.3t

Cisco IOS 12.0

12.0

Cisco IOS 12.0DA

12.0da

Cisco IOS 12.0DB

12.0db

Cisco IOS 12.0DC

12.0dc

Cisco IOS 12.0S

12.0s

Cisco IOS 12.0SC

12.0sc

Cisco IOS 12.0SL

12.0sl

Cisco IOS 12.0SP

12.0sp

Cisco IOS 12.0ST

12.0st

Cisco IOS 12.0SX

12.0sx

Cisco IOS 12.0SY

12.0sy

Cisco IOS 12.0SZ

12.0sz

Cisco IOS 12.0T

12.0t

Cisco IOS 12.0W5

12.0w5

Cisco IOS 12.0WC

12.0wc

Cisco IOS 12.0WT

12.0wt

Cisco IOS 12.0XA

12.0xa

Cisco IOS 12.0XB

12.0xb

Cisco IOS 12.0XC

12.0xc

Cisco IOS 12.0XD

12.0xd

Cisco IOS 12.0XE

12.0xe

Cisco IOS 12.0XF

12.0xf

Cisco IOS 12.0XG

12.0xg

Cisco IOS 12.0XH

12.0xh

Cisco IOS 12.0XI

12.0xi

Cisco IOS 12.0XJ

12.0xj

Cisco IOS 12.0XK

12.0xk

Cisco IOS 12.0XL

12.0xl

Cisco IOS 12.0XM

12.0xm

Cisco IOS 12.0XN

12.0xn

Cisco IOS 12.0XP

12.0xp

Cisco IOS 12.0XQ

12.0xq

Cisco IOS 12.0XR

12.0xr

Cisco IOS 12.0XS

12.0xs

Cisco IOS 12.0XU

12.0xu

Cisco IOS 12.0Xv

12.0xv

Cisco IOS 12.0 XW

12.0xw

Cisco IOS 12.1

12.1

Cisco IOS 12.1AA

12.1aa

Cisco IOS 12.1AX

12.1ax

Cisco IOS 12.1AY

12.1ay

Cisco IOS 12.1DA

12.1da

Cisco IOS 12.1DB

12.1db

Cisco IOS 12.1DC

12.1dc

Cisco IOS 12.1E

12.1e

Cisco IOS 12.1EA

12.1ea

Cisco IOS 12.1EB

12.1eb

Cisco IOS 12.1EC

12.1ec

Cisco IOS 12.1EV

12.1ev

Cisco IOS 12.1EW

12.1ew

Cisco IOS 12.1EX

12.1ex

Cisco IOS 12.1EY

12.1ey

Cisco IOS 12.1 M

12.1m

Cisco IOS 12.1T

12.1t

Cisco IOS 12.1XA

12.1xa

Cisco IOS 12.1XB

12.1xb

Cisco IOS 12.1XC

12.1xc

Cisco IOS 12.1XD

12.1xd

Cisco IOS 12.1XE

12.1xe

Cisco IOS 12.1XF

12.1xf

Cisco IOS 12.1XG

12.1xg

Cisco IOS 12.1XH

12.1xh

Cisco IOS 12.1XI

12.1xi

Cisco IOS 12.1XJ

12.1xj

Cisco IOS 12.1XK

12.1xk

Cisco IOS 12.1XL

12.1xl

Cisco IOS 12.1XM

12.1xm

Cisco IOS 12.1XP

12.1xp

Cisco IOS 12.1XQ

12.1xq

Cisco IOS 12.1XR

12.1xr

Cisco IOS 12.1XS

12.1xs

Cisco IOS 12.1XT

12.1xt

Cisco IOS 12.1XU

12.1xu

Cisco IOS 12.1XV

12.1xv

Cisco IOS 12.1XW

12.1xw

Cisco IOS 12.1XX

12.1xx

Cisco IOS 12.1XY

12.1xy

Cisco IOS 12.1XZ

12.1xz

Cisco IOS 12.1YB

12.1yb

Cisco IOS 12.1YC

12.1yc

Cisco IOS 12.1YD

12.1yd

Cisco IOS 12.1YE

12.1ye

Cisco IOS 12.1YF

12.1yf

Cisco IOS 12.1YH

12.1yh

Cisco IOS 12.1YI

12.1yi

Cisco IOS 12.1YJ

12.1yj

Cisco IOS 12.2

12.2

Cisco IOS 12.2B

12.2b

Cisco IOS 12.2BC

12.2bc

Cisco IOS 12.2BW

12.2bw

Cisco IOS 12.2BX

12.2bx

Cisco IOS 12.2BZ

12.2bz

Cisco IOS 12.2CX

12.2cx

Cisco IOS 12.2CY

12.2cy

Cisco IOS 12.2DA

12.2da

Cisco IOS 12.2DD

12.2dd

Cisco IOS 12.2DX

12.2dx

Cisco IOS 12.2JA

12.2ja

Cisco IOS 12.2MB

12.2mb

Cisco IOS 12.2MC

12.2mc

Cisco IOS 12.2MX

12.2mx

Cisco IOS 12.2S

12.2s

Cisco IOS 12.2SX

12.2sx

Cisco IOS 12.2SY

12.2sy

Cisco IOS 12.2SZ

12.2sz

Cisco IOS 12.2T

12.2t

Cisco IOS 12.2XA

12.2xa

Cisco IOS 12.2XB

12.2xb

Cisco IOS 12.2XC

12.2xc

Cisco IOS 12.2XD

12.2xd

Cisco IOS 12.2XE

12.2xe

Cisco IOS 12.2XF

12.2xf

Cisco IOS 12.2XG

12.2xg

Cisco IOS 12.2XH

12.2xh

Cisco IOS 12.2XI

12.2xi

Cisco IOS 12.2XJ

12.2xj

Cisco IOS 12.2XK

12.2xk

Cisco IOS 12.2XL

12.2xl

Cisco IOS 12.2XM

12.2xm

Cisco IOS 12.2XN

12.2xn

Cisco IOS 12.2XQ

12.2xq

Cisco IOS 12.2XR

12.2xr

Cisco IOS 12.2XS

12.2xs

Cisco IOS 12.2XT

12.2xt

Cisco IOS 12.2XU

12.2xu

Cisco IOS 12.2XW

12.2xw

Cisco IOS 12.2YA

12.2ya

Cisco IOS 12.2YB

12.2yb

Cisco IOS 12.2YC

12.2yc

Cisco IOS 12.2YD

12.2yd

Cisco IOS 12.2YF

12.2yf

Cisco IOS 12.2YG

12.2yg

Cisco IOS 12.2YH

12.2yh

Cisco IOS 12.2YJ

12.2yj

Cisco IOS 12.2YK

12.2yk

Cisco IOS 12.2YL

12.2yl

Cisco IOS 12.2YM

12.2ym

Cisco IOS 12.2YN

12.2yn

Cisco IOS 12.2YO

12.2yo

Cisco IOS 12.2YP

12.2yp

Cisco IOS 12.2YQ

12.2yq

Cisco IOS 12.2YR

12.2yr

Cisco IOS 12.2YS

12.2ys

Cisco IOS 12.2YT

12.2yt

Cisco IOS 12.2YU

12.2yu

Cisco IOS 12.2YV

12.2yv

Cisco IOS 12.2YW

12.2yw

Cisco IOS 12.2YX

12.2yx

Cisco IOS 12.2YY

12.2yy

Cisco IOS 12.2YZ

12.2yz

Cisco IOS 12.2ZA

12.2za

Cisco IOS 12.2ZB

12.2zb

Cisco IOS 12.2ZC

12.2zc

Cisco IOS 12.2ZD

12.2zd

Cisco IOS 12.2ZE

12.2ze

Cisco IOS 12.2ZF

12.2zf

Cisco IOS 12.2ZG

12.2zg

Cisco IOS 12.2ZH

12.2zh

Cisco IOS 12.2ZJ

12.2zj

Cisco Optical Networking Systems Software (ONS) 3.0

3.0

Cisco Optical Networking Systems Software (ONS) 3.1.0

3.1.0

Cisco Optical Networking Systems Software (ONS) 3.2.0

3.2.0

Cisco Optical Networking Systems Software (ONS) 3.3.0

3.3.0

Cisco Optical Networking Systems Software (ONS) 3.4.0

3.4.0

Cisco Optical Networking Systems Software (ONS) 4.0.0

4.0.0

Cisco ONS 15454 Multiservice Transport Platform (MSTP)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.