ID

VAR-199903-0037


CVE

CVE-1999-0430


TITLE

Cisco Catalyst Switch Remote Denial of Service Attack Vulnerability

Trust: 1.4

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // CNVD: CNVD-1999-0447 // CNNVD: CNNVD-199903-011

DESCRIPTION

Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. Cisco Catalyst is a widely used switch product developed by Cisco.  A remote attacker may connect to the TCP 7161 port of the affected switch, causing the management module to reload. At this time, the switch will not forward the packet. Although the switch can automatically recover and forward the packet afterwards, the attacker can continue to attack and form Denial of service attack

Trust: 1.71

sources: NVD: CVE-1999-0430 // CNVD: CNVD-1999-0447 // IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // VULHUB: VHN-430

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // CNVD: CNVD-1999-0447

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst 5xxx supervisor softwarescope:eqversion:2.1.502

Trust: 1.6

vendor:ciscomodel:catalyst 29xx supervisor softwarescope:eqversion:2.1.502

Trust: 1.6

vendor:ciscomodel:catalyst 29xx supervisor softwarescope:eqversion:2.1.5

Trust: 1.6

vendor:ciscomodel:catalyst 29xx supervisor softwarescope:eqversion:1.0

Trust: 1.6

vendor:ciscomodel:catalyst 5xxx supervisor softwarescope:eqversion:1.0

Trust: 1.6

vendor:ciscomodel:catalyst 5xxx supervisor softwarescope:eqversion:2.1.5

Trust: 1.6

vendor:ciscomodel:catalyst 12xx supervisor softwarescope:eqversion:4.29

Trust: 1.6

vendor:ciscomodel:catalyst 29xx supervisor softwarescope:eqversion:2.1.501

Trust: 1.6

vendor:ciscomodel:catalyst 5xxx supervisor softwarescope:eqversion:2.1.501

Trust: 1.6

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:catalyst 12xx supervisormodel: - scope:eqversion:4.29

Trust: 0.2

vendor:catalyst 29xx supervisormodel: - scope:eqversion:1.0

Trust: 0.2

vendor:catalyst 29xx supervisormodel: - scope:eqversion:2.1.5

Trust: 0.2

vendor:catalyst 29xx supervisormodel: - scope:eqversion:2.1.501

Trust: 0.2

vendor:catalyst 29xx supervisormodel: - scope:eqversion:2.1.502

Trust: 0.2

vendor:catalyst 5xxx supervisormodel: - scope:eqversion:1.0

Trust: 0.2

vendor:catalyst 5xxx supervisormodel: - scope:eqversion:2.1.5

Trust: 0.2

vendor:catalyst 5xxx supervisormodel: - scope:eqversion:2.1.501

Trust: 0.2

vendor:catalyst 5xxx supervisormodel: - scope:eqversion:2.1.502

Trust: 0.2

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // CNVD: CNVD-1999-0447 // CNNVD: CNNVD-199903-011 // NVD: CVE-1999-0430

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-1999-0430
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-199903-011
value: MEDIUM

Trust: 0.6

IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-430
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-1999-0430
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-430
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // VULHUB: VHN-430 // CNNVD: CNNVD-199903-011 // NVD: CVE-1999-0430

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-1999-0430

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-199903-011

TYPE

unknown

Trust: 0.8

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // CNNVD: CNNVD-199903-011

EXTERNAL IDS

db:NVDid:CVE-1999-0430

Trust: 2.5

db:OSVDBid:1103

Trust: 1.7

db:CNNVDid:CNNVD-199903-011

Trust: 0.9

db:CNVDid:CNVD-1999-0447

Trust: 0.8

db:IVDid:193B08E6-23CF-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-430

Trust: 0.1

sources: IVD: 193b08e6-23cf-11e6-abef-000c29c66e3d // CNVD: CNVD-1999-0447 // VULHUB: VHN-430 // CNNVD: CNNVD-199903-011 // NVD: CVE-1999-0430

REFERENCES

url:http://www.osvdb.org/1103

Trust: 2.7

url: -

Trust: 0.1

sources: VULHUB: VHN-430 // CNNVD: CNNVD-199903-011 // NVD: CVE-1999-0430

CREDITS

Cisco

Trust: 0.6

sources: CNNVD: CNNVD-199903-011

SOURCES

db:IVDid:193b08e6-23cf-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-1999-0447
db:VULHUBid:VHN-430
db:CNNVDid:CNNVD-199903-011
db:NVDid:CVE-1999-0430

LAST UPDATE DATE

2024-11-22T23:15:58.313000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-1999-0447date:1999-01-01T00:00:00
db:VULHUBid:VHN-430date:2008-09-09T00:00:00
db:CNNVDid:CNNVD-199903-011date:2005-05-02T00:00:00
db:NVDid:CVE-1999-0430date:2024-11-20T23:28:43.217

SOURCES RELEASE DATE

db:IVDid:193b08e6-23cf-11e6-abef-000c29c66e3ddate:1999-01-01T00:00:00
db:CNVDid:CNVD-1999-0447date:1999-01-01T00:00:00
db:VULHUBid:VHN-430date:1999-03-01T00:00:00
db:CNNVDid:CNNVD-199903-011date:1997-12-15T00:00:00
db:NVDid:CVE-1999-0430date:1999-03-01T05:00:00