CERTA-2003-AVI-103
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente dans CatOS permet à un utilisateur mal intentionné d'effectuer un déni de service sur les commutateurs CISCO.
Description
L'envoi de paquets TCP avec certaines combinaisons de drapeaux non standard vers le service d'un commutateur permet d'effectuer un déni de service sur les équipements vulnérables.
Solution
Se référer au bulletin de sécurité Cisco (cf. section Documentation) pour l'obtention d'un correctif.
CatOs pour tous les commutateurs Catalyst suivants :
- Catalyst série 4000 incluant les modèles 2948G et 2980G/2980G-A ;
- Catalyst série 5000 incluant les modèles 2901, 2902 et 2926 ;
- Catalyst 6000.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eCatOs pour tous les commutateurs Catalyst suivants :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eCatalyst s\u00e9rie 4000 incluant les mod\u00e8les 2948G et 2980G/2980G-A ;\u003c/LI\u003e \u003cLI\u003eCatalyst s\u00e9rie 5000 incluant les mod\u00e8les 2901, 2902 et 2926 ;\u003c/LI\u003e \u003cLI\u003eCatalyst 6000.\u003c/LI\u003e \u003c/UL\u003e",
"content": "## Description\n\nL\u0027envoi de paquets TCP avec certaines combinaisons de drapeaux non\nstandard vers le service d\u0027un commutateur permet d\u0027effectuer un d\u00e9ni de\nservice sur les \u00e9quipements vuln\u00e9rables.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Cisco (cf. section Documentation)\npour l\u0027obtention d\u0027un correctif.\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 CISCO \"Denial-of-Service of TCP-based Services in CatOS\" :",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml"
}
],
"reference": "CERTA-2003-AVI-103",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans CatOS permet \u00e0 un utilisateur mal\nintentionn\u00e9 d\u0027effectuer un d\u00e9ni de service sur les commutateurs CISCO.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans CISCO CatOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 CISCO : \"Denial-of-Service of TCP-based Services in CatOS\"",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…