CERTA-2004-AVI-021

Vulnerability from certfr_avis - Published: - Updated:

None

Description

Un utilisateur mal intentionné peut, au moyen de trames de niveau 2 (modèle ISO de l'OSI) habilement constituées, réaliser un déni de service sur les commutateurs Cisco 6000, 6500 et 7600.

Selon Cisco, cette vulnérabilité peut être exploitée à distance sous certaines conditions.

Solution

Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention d'un correctif.

Commutateurs Cisco 6000, 6500 et 7600 dotés de la carte MSFC2 (Multilayer Switch Feature Card 2) et possédant une des deux caractéristiques suivantes :

  • Module FlexWan ou OSM (Optical Services Module) ;
  • IOS version 12.1(8b)E14.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eCommutateurs Cisco 6000, 6500 et 7600  dot\u00e9s de la carte MSFC2 (Multilayer Switch Feature Card 2) et  poss\u00e9dant une des deux caract\u00e9ristiques suivantes :  \u003cUL\u003e    \u003cLI\u003eModule FlexWan ou OSM (Optical Services Module) ;\u003c/LI\u003e    \u003cLI\u003eIOS version 12.1(8b)E14.\u003c/LI\u003e  \u003c/UL\u003e\u003c/p\u003e",
  "content": "## Description\n\nUn utilisateur mal intentionn\u00e9 peut, au moyen de trames de niveau 2\n(mod\u00e8le ISO de l\u0027OSI) habilement constitu\u00e9es, r\u00e9aliser un d\u00e9ni de\nservice sur les commutateurs Cisco 6000, 6500 et 7600.\n\nSelon Cisco, cette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e \u00e0 distance sous\ncertaines conditions.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention d\u0027un correctif.\n",
  "cves": [],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 \"Crafted Layer 2 Frame  Vulnerability\" de Cisco :",
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml"
    }
  ],
  "reference": "CERTA-2004-AVI-021",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-02-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "D\u00e9ni de service des commutateurs Cisco 6000, 6500 et 7600",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 \"Crafted Layer 2 Frame Vulnerability\" de Cisco",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…