CERTA-2000-AVI-086
Vulnerability from certfr_avis - Published: - Updated:None
Description
Un utilisateur mal intentionné, effectuant une série rapide de fausses authentifications telnet, peut provoquer un déni de service obligeant le redémarrage du commutateur.
Nota : Tous les types d'authentification telnet ( Kerberos ) sont concernés par cette vulnérabilité.
Contournement provisoire
Installer une liste de contrôle d'accès sur le commutateur :
set ip permit enable telnet
set ip permit \<addr> [mask]
Désactiver la gestion de commande à distance.
Solution
Appliquer le correctif fourni par CISCO :
http://www.cisco.com
None
Impacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Catalyst 6000 - version logicielle 5.3(1)CSX \u00e0 5.5(4) et 5.5(4.a).",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4000 et 5000 - version logicielle 4.5(2) \u00e0 5.5(4) et 5.5(4.a) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn utilisateur mal intentionn\u00e9, effectuant une s\u00e9rie rapide de fausses\nauthentifications telnet, peut provoquer un d\u00e9ni de service obligeant le\nred\u00e9marrage du commutateur.\n\nNota : Tous les types d\u0027authentification telnet ( Kerberos ) sont\nconcern\u00e9s par cette vuln\u00e9rabilit\u00e9.\n\n## Contournement provisoire\n\nInstaller une liste de contr\u00f4le d\u0027acc\u00e8s sur le commutateur :\n\nset ip permit enable telnet\n\nset ip permit \\\u003caddr\\\u003e \\[mask\\] \n \n\nD\u00e9sactiver la gestion de commande \u00e0 distance.\n\n## Solution\n\nAppliquer le correctif fourni par CISCO :\n\n http://www.cisco.com\n",
"cves": [],
"links": [
{
"title": "Avis de s\u00e9curit\u00e9 CISCO :",
"url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml"
}
],
"reference": "CERTA-2000-AVI-086",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2000-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 dans les commutateurs CISCO Catalyst 4000, 5000 et 6000",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis CISCO",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…