CERTA-2004-AVI-021
Vulnerability from certfr_avis

None

Description

Un utilisateur mal intentionné peut, au moyen de trames de niveau 2 (modèle ISO de l'OSI) habilement constituées, réaliser un déni de service sur les commutateurs Cisco 6000, 6500 et 7600.

Selon Cisco, cette vulnérabilité peut être exploitée à distance sous certaines conditions.

Solution

Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention d'un correctif.

Commutateurs Cisco 6000, 6500 et 7600 dotés de la carte MSFC2 (Multilayer Switch Feature Card 2) et possédant une des deux caractéristiques suivantes :

  • Module FlexWan ou OSM (Optical Services Module) ;
  • IOS version 12.1(8b)E14.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eCommutateurs Cisco 6000, 6500 et 7600  dot\u00e9s de la carte MSFC2 (Multilayer Switch Feature Card 2) et  poss\u00e9dant une des deux caract\u00e9ristiques suivantes :  \u003cUL\u003e    \u003cLI\u003eModule FlexWan ou OSM (Optical Services Module) ;\u003c/LI\u003e    \u003cLI\u003eIOS version 12.1(8b)E14.\u003c/LI\u003e  \u003c/UL\u003e\u003c/p\u003e",
  "content": "## Description\n\nUn utilisateur mal intentionn\u00e9 peut, au moyen de trames de niveau 2\n(mod\u00e8le ISO de l\u0027OSI) habilement constitu\u00e9es, r\u00e9aliser un d\u00e9ni de\nservice sur les commutateurs Cisco 6000, 6500 et 7600.\n\nSelon Cisco, cette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e \u00e0 distance sous\ncertaines conditions.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention d\u0027un correctif.\n",
  "cves": [],
  "initial_release_date": "2004-02-05T00:00:00",
  "last_revision_date": "2004-02-05T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 \"Crafted Layer 2 Frame  Vulnerability\" de Cisco :",
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml"
    }
  ],
  "reference": "CERTA-2004-AVI-021",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-02-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "D\u00e9ni de service des commutateurs Cisco 6000, 6500 et 7600",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 \"Crafted Layer 2 Frame Vulnerability\" de Cisco",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…