ID
VAR-199712-0021
TITLE
Cisco Catalyst Supervisor Remote Reload
Trust: 0.3
DESCRIPTION
This desciprion was taken from the Cisco advisory. A remote attacker who knows how to exploit this vulnerability, and who can make a connection to TCP port 7161 on an affected switch, can cause the supervisor module of that switch to reload. While the supervisor is reloading, the switch will not forward traffic, and the attack will therefore deny service to the equipment attached to the switch. The switch will recover automatically, but repeated attacks can extend the denial of service indefinitely.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 5xxx2.1.502 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 5xxx2.1.501 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 5xxx2.1.5 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 5xxx1.0 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 29xx2.1.502 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 29xx2.1.501 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 29xx2.1.5 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 29xx1.0 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | eq | version: | 12xx4.29 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | ne | version: | 5xxx2.1.6 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | ne | version: | 29xx2.1.6 | Trust: 0.3 |
vendor: | cisco | model: | catalyst supervisor software | scope: | ne | version: | 12xx4.30 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Input Validation Error
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 705 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/sec_incident_response.shtml | Trust: 0.3 |
CREDITS
This vulnerability was first reported by Cisco in an advisory on 24 March 1999.
Trust: 0.3
SOURCES
db: | BID | id: | 705 |
LAST UPDATE DATE
2022-05-17T02:07:53.553000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 705 | date: | 1997-12-15T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 705 | date: | 1997-12-15T00:00:00 |