var-200307-0051
Vulnerability from variot
Cisco Catalyst is a family of business-grade switches distributed and maintained by CISCO. Cisco Catalyst does not properly handle non-standard TCP packet communication. A remote attacker can exploit this vulnerability to perform a denial of service attack on the switch device, causing legitimate users to fail to communicate properly. Introducing a TCP connection using eight non-standard TCP tag combinations, the Catalyst switch will stop the normal TCP response for some services. To re-use the functionality of this service, the switch needs to be restarted. These standard services, including HTTP, Telnet, and SSH, are not affected by this vulnerability, including console communications. This Cisco bug ID is: CSCdw52219. Because of this, an attacker may be able to deny legitimate user access to the switch
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200307-0051", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "catos", scope: "eq", trust: 3.3, vendor: "cisco", version: "5.5", }, { model: "catos", scope: "eq", trust: 2.7, vendor: "cisco", version: "6.1", }, { model: "catos csx", scope: "eq", trust: 2.4, vendor: "cisco", version: "5.3", }, { model: "catos csx", scope: "eq", trust: 1.2, vendor: "cisco", version: "5.2", }, { model: "catos", scope: "eq", trust: 0.9, vendor: "cisco", version: "6.3", }, { model: "catos", scope: "eq", trust: 0.9, vendor: "cisco", version: "6.2", }, { model: "catos", scope: "eq", trust: 0.9, vendor: "cisco", version: "5.4", }, { model: "catos", scope: "eq", trust: 0.9, vendor: "cisco", version: "5.1", }, { model: "catos", scope: "eq", trust: 0.9, vendor: "cisco", version: "4.5", }, { model: null, scope: null, trust: 0.6, vendor: "no", version: null, }, { model: "catos", scope: "eq", trust: 0.6, vendor: "cisco", version: "7.1", }, { model: "catos csx", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.1", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.1(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.1(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(5.10)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(5)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(3)x1", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(3)x", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(9)", }, { model: "catos cv", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(8)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(7)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(6)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(5)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(13.5)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(13)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(12)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(11)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(10)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.5(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.4(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.4(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.4(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.4(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(7)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(6)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(5)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(9)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(8)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(7)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(6)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(5)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(4)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(13)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(12)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(11)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(10)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.4(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.3", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(1)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(3)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(13)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "8.1", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.6(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.6", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.5(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.5", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.4(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.3(2)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.3(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.3", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.2(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.4(3)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.4(2)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.4(1)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.3(6)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.5(14)", }, { model: "catos", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.5(14)", }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, { db: "BID", id: "8149", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Vulnerability disclosed by Cisco.", sources: [ { db: "BID", id: "8149", }, ], trust: 0.3, }, cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2003-2105", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "CNVD", id: "CNVD-2003-2105", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco Catalyst is a family of business-grade switches distributed and maintained by CISCO. Cisco Catalyst does not properly handle non-standard TCP packet communication. A remote attacker can exploit this vulnerability to perform a denial of service attack on the switch device, causing legitimate users to fail to communicate properly. Introducing a TCP connection using eight non-standard TCP tag combinations, the Catalyst switch will stop the normal TCP response for some services. To re-use the functionality of this service, the switch needs to be restarted. These standard services, including HTTP, Telnet, and SSH, are not affected by this vulnerability, including console communications. This Cisco bug ID is: CSCdw52219. Because of this, an attacker may be able to deny legitimate user access to the switch", sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, { db: "BID", id: "8149", }, ], trust: 0.81, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "BID", id: "8149", trust: 0.9, }, { db: "CNVD", id: "CNVD-2003-2105", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, { db: "BID", id: "8149", }, ], }, id: "VAR-200307-0051", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, ], trust: 0.95529557, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, ], }, last_update_date: "2022-05-17T01:44:50.822000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Cisco Catalyst Non-Standard TCP Tag Remote Denial of Service Vulnerability Patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/42616", }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 0.9, url: "http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml", }, ], sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, { db: "BID", id: "8149", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2003-2105", }, { db: "BID", id: "8149", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2003-07-09T00:00:00", db: "CNVD", id: "CNVD-2003-2105", }, { date: "2003-07-09T00:00:00", db: "BID", id: "8149", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2014-01-20T00:00:00", db: "CNVD", id: "CNVD-2003-2105", }, { date: "2003-07-09T00:00:00", db: "BID", id: "8149", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "network", sources: [ { db: "BID", id: "8149", }, ], trust: 0.3, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco Catalyst Non-Standard TCP Tag Remote Denial of Service Vulnerability", sources: [ { db: "CNVD", id: "CNVD-2003-2105", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Failure to Handle Exceptional Conditions", sources: [ { db: "BID", id: "8149", }, ], trust: 0.3, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.