ID

VAR-199909-0003


CVE

CVE-1999-1129


TITLE

IEEE 802.1q unauthorized VLAN Traversing weaknesses

Trust: 0.6

sources: CNNVD: CNNVD-199909-002

DESCRIPTION

Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. The 802.1q standard is susceptible to issues that allow attackers to send and receive packets from one VLAN to another without authorization. By spoofing various Ethernet frame fields such as the source or destination MAC addresses, IP addresses, and VLAN tags, attackers may cause packets to traverse from one VLAN to another, and possibly back again. Attackers may also add multiple VLAN tags to packets to cause multiple routers to decapsulate the packets in unexpected ways, aiding the attacker in traversing VLANs. This issue allows attackers to traverse from one VLAN to another in an unauthorized fashion. As some users may utilize VLANs to segregate network segments containing differing security properties, this may have various consequences. This issue may be exacerbated by utilizing attacker-controlled external network hosts to bounce packets between VLANs

Trust: 1.26

sources: NVD: CVE-1999-1129 // BID: 615 // VULHUB: VHN-1110

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:11.2\(8\)sa5

Trust: 1.6

vendor:ciscomodel:catalyst 2900 vlanscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 2900 vlanscope: - version: -

Trust: 0.6

vendor:ieeemodel:802.1qscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios sa5scope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:catalyst ws-c2924m-xlscope: - version: -

Trust: 0.3

sources: BID: 615 // CNNVD: CNNVD-199909-002 // NVD: CVE-1999-1129

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-1999-1129
value: HIGH

Trust: 1.0

CNNVD: CNNVD-199909-002
value: HIGH

Trust: 0.6

VULHUB: VHN-1110
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-1999-1129
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-1110
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-1110 // CNNVD: CNNVD-199909-002 // NVD: CVE-1999-1129

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-1999-1129

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-199909-002

TYPE

Design Error

Trust: 0.9

sources: BID: 615 // CNNVD: CNNVD-199909-002

EXTERNAL IDS

db:NVDid:CVE-1999-1129

Trust: 2.0

db:BIDid:615

Trust: 2.0

db:CNNVDid:CNNVD-199909-002

Trust: 0.7

db:XFid:3294

Trust: 0.6

db:BUGTRAQid:19990901 VLAN SECURITY

Trust: 0.6

db:VULHUBid:VHN-1110

Trust: 0.1

sources: VULHUB: VHN-1110 // BID: 615 // CNNVD: CNNVD-199909-002 // NVD: CVE-1999-1129

REFERENCES

url:http://www.securityfocus.com/bid/615

Trust: 1.7

url:http://www.securityfocus.com/archive/1/26008

Trust: 1.7

url:http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/3294

Trust: 1.1

url:http://xforce.iss.net/static/3294.php

Trust: 0.6

url:http://www.cisco.com/warp/public/707/sec_incident_response.shtml

Trust: 0.3

url:/archive/1/419831

Trust: 0.3

url:/archive/1/419834

Trust: 0.3

sources: VULHUB: VHN-1110 // BID: 615 // CNNVD: CNNVD-199909-002 // NVD: CVE-1999-1129

CREDITS

This research and the resulting post was sent to the Bugtraq mailing list by Dave Taylor <david.taylor@alphawest.com.au> & Steve Schuppp <Steve.schupp@alphawest.com.au>. Further research was provided by "Andrew A. Vladimirov" <mlists@arhont.com>, Arhont L

Trust: 0.6

sources: CNNVD: CNNVD-199909-002

SOURCES

db:VULHUBid:VHN-1110
db:BIDid:615
db:CNNVDid:CNNVD-199909-002
db:NVDid:CVE-1999-1129

LAST UPDATE DATE

2024-08-14T14:48:22.361000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-1110date:2017-12-19T00:00:00
db:BIDid:615date:2009-07-11T00:56:00
db:CNNVDid:CNNVD-199909-002date:2005-10-20T00:00:00
db:NVDid:CVE-1999-1129date:2017-12-19T02:29:02.470

SOURCES RELEASE DATE

db:VULHUBid:VHN-1110date:1999-09-01T00:00:00
db:BIDid:615date:1999-09-02T00:00:00
db:CNNVDid:CNNVD-199909-002date:1999-09-01T00:00:00
db:NVDid:CVE-1999-1129date:1999-09-01T04:00:00