ID

VAR-200107-0161


CVE

CVE-2001-0429


TITLE

Cisco Catalyst Switch Vulnerability

Trust: 0.8

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200107-020

DESCRIPTION

Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur. This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. "The Bat!" is an MUA for Windows by Rit Research Labs. "The Bat!" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause "The Bat!" to incorrectly interpret the message's structure. This can lead "The Bat!" to read text in the message body as a response from the POP3 server. The current (corrupt) message will not be deleted from the server, and the mail download process will stop. As a result, the user will remain unable to receive new email messages from the affected POP3 account. This leads to network instability and denial of service

Trust: 5.04

sources: NVD: CVE-2001-0429 // CERT/CC: VU#676552 // CERT/CC: VU#890128 // CERT/CC: VU#642760 // CERT/CC: VU#555464 // CERT/CC: VU#310816 // BID: 2636 // IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // VULHUB: VHN-3248

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d

AFFECTED PRODUCTS

vendor:lotusmodel: - scope: - version: -

Trust: 3.2

vendor:ciscomodel:catosscope:eqversion:6.1\(1c\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1.2

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:5.5\(6\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:4.5.10

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:5.5\(4b\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:4.5\(11\)

Trust: 1.6

vendor:ciscomodel:catosscope:eqversion:6.1\(2\)

Trust: 1.6

vendor:ritmodel: - scope: - version: -

Trust: 0.8

vendor:ritmodel:research labs the bat!scope:eqversion:1.101

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.51

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.49

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.48

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.47

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.46

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.45

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.44

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.43

Trust: 0.3

vendor:ritmodel:research labs the bat! fscope:eqversion:1.42

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.42

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.41

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.39

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.36

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.35

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.34

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.33

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.32

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.31

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.22

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.21

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.19

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.18

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.17

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.15

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.14

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.5

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.1

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.043

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.041

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.039

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.036

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.035

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.032

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.031

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.029

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.028

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.015

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:eqversion:1.011

Trust: 0.3

vendor:ritmodel:research labs the bat!scope:neversion:1.52

Trust: 0.3

vendor:catosmodel: - scope:eqversion:4.5(11)

Trust: 0.2

vendor:catosmodel: - scope:eqversion:4.5.10

Trust: 0.2

vendor:catosmodel:5.5scope: - version: -

Trust: 0.2

vendor:catosmodel: - scope:eqversion:5.5(6)

Trust: 0.2

vendor:catosmodel:6.1scope: - version: -

Trust: 0.2

vendor:catosmodel: - scope:eqversion:6.1(2)

Trust: 0.2

vendor:catosmodel: - scope:eqversion:6.1.2

Trust: 0.2

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // CERT/CC: VU#676552 // CERT/CC: VU#890128 // CERT/CC: VU#642760 // CERT/CC: VU#555464 // CERT/CC: VU#310816 // BID: 2636 // CNNVD: CNNVD-200107-020 // NVD: CVE-2001-0429

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0429
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#676552
value: 10.50

Trust: 0.8

CARNEGIE MELLON: VU#890128
value: 5.07

Trust: 0.8

CARNEGIE MELLON: VU#642760
value: 10.50

Trust: 0.8

CARNEGIE MELLON: VU#555464
value: 4.25

Trust: 0.8

CARNEGIE MELLON: VU#310816
value: 1.62

Trust: 0.8

CNNVD: CNNVD-200107-020
value: MEDIUM

Trust: 0.6

IVD: bbed9956-23ce-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-3248
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0429
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IVD: bbed9956-23ce-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-3248
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // CERT/CC: VU#676552 // CERT/CC: VU#890128 // CERT/CC: VU#642760 // CERT/CC: VU#555464 // CERT/CC: VU#310816 // VULHUB: VHN-3248 // CNNVD: CNNVD-200107-020 // NVD: CVE-2001-0429

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0429

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200107-020

TYPE

unknown

Trust: 0.8

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200107-020

EXTERNAL IDS

db:NVDid:CVE-2001-0429

Trust: 1.9

db:BIDid:2604

Trust: 1.7

db:BIDid:2636

Trust: 1.1

db:CNNVDid:CNNVD-200107-020

Trust: 0.9

db:BIDid:2571

Trust: 0.8

db:XFid:6349

Trust: 0.8

db:CERT/CCid:VU#676552

Trust: 0.8

db:XFid:6348

Trust: 0.8

db:BIDid:2575

Trust: 0.8

db:CERT/CCid:VU#890128

Trust: 0.8

db:BIDid:2598

Trust: 0.8

db:XFid:6351

Trust: 0.8

db:CERT/CCid:VU#642760

Trust: 0.8

db:BIDid:2599

Trust: 0.8

db:XFid:6350

Trust: 0.8

db:CERT/CCid:VU#555464

Trust: 0.8

db:XFid:6423

Trust: 0.8

db:CERT/CCid:VU#310816

Trust: 0.8

db:CISCOid:20010416 CATALYST 5000 SERIES 802.1X VULNERABILITY

Trust: 0.6

db:CIACid:L-072

Trust: 0.6

db:XFid:6379

Trust: 0.6

db:XFid:8021

Trust: 0.6

db:IVDid:BBED9956-23CE-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-3248

Trust: 0.1

sources: IVD: bbed9956-23ce-11e6-abef-000c29c66e3d // CERT/CC: VU#676552 // CERT/CC: VU#890128 // CERT/CC: VU#642760 // CERT/CC: VU#555464 // CERT/CC: VU#310816 // VULHUB: VHN-3248 // BID: 2636 // CNNVD: CNNVD-200107-020 // NVD: CVE-2001-0429

REFERENCES

url:http://www.securityfocus.com/advisories/3208

Trust: 3.2

url:http://www.securityfocus.com/bid/2604

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/l-072.shtml

Trust: 1.7

url:http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6379

Trust: 1.1

url:http://www.securityfocus.com/bid/2571

Trust: 0.8

url:http://xforce.iss.net/static/6349.php

Trust: 0.8

url:http://www.securityfocus.com/bid/2575

Trust: 0.8

url:http://xforce.iss.net/static/6348.php

Trust: 0.8

url:http://www.securityfocus.com/bid/2598

Trust: 0.8

url:http://xforce.iss.net/static/6351.php

Trust: 0.8

url:http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c?openview&start=3.111&count=30&expand=3.126#3.126

Trust: 0.8

url:http://www.securityfocus.com/bid/2599

Trust: 0.8

url:http://xforce.iss.net/static/6350.php

Trust: 0.8

url:http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c/59719a1dd92c03e385256a4d0073766b?opendocument

Trust: 0.8

url:http://www.securityfocus.com/bid/2636

Trust: 0.8

url:http://www.ritlabs.com/the_bat/index.html

Trust: 0.8

url:http://www.security.nnov.ru/search/news.asp?binid=1136

Trust: 0.8

url:http://xforce.iss.net/static/6423.php

Trust: 0.8

url:http://xforce.iss.net/static/6379.php

Trust: 0.6

url:http://www.thebat.net

Trust: 0.3

sources: CERT/CC: VU#676552 // CERT/CC: VU#890128 // CERT/CC: VU#642760 // CERT/CC: VU#555464 // CERT/CC: VU#310816 // VULHUB: VHN-3248 // BID: 2636 // CNNVD: CNNVD-200107-020 // NVD: CVE-2001-0429

CREDITS

Reported to bugtraq by 3APA3A <3APA3A@SECURITY.NNOV.RU> on Wed, 18 Apr, 2001.

Trust: 0.3

sources: BID: 2636

SOURCES

db:IVDid:bbed9956-23ce-11e6-abef-000c29c66e3d
db:CERT/CCid:VU#676552
db:CERT/CCid:VU#890128
db:CERT/CCid:VU#642760
db:CERT/CCid:VU#555464
db:CERT/CCid:VU#310816
db:VULHUBid:VHN-3248
db:BIDid:2636
db:CNNVDid:CNNVD-200107-020
db:NVDid:CVE-2001-0429

LAST UPDATE DATE

2025-05-17T01:49:29.096000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#676552date:2001-07-26T00:00:00
db:CERT/CCid:VU#890128date:2001-07-12T00:00:00
db:CERT/CCid:VU#642760date:2001-07-17T00:00:00
db:CERT/CCid:VU#555464date:2001-07-17T00:00:00
db:CERT/CCid:VU#310816date:2001-08-30T00:00:00
db:VULHUBid:VHN-3248date:2017-10-10T00:00:00
db:BIDid:2636date:2001-04-18T00:00:00
db:CNNVDid:CNNVD-200107-020date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0429date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:IVDid:bbed9956-23ce-11e6-abef-000c29c66e3ddate:2001-07-02T00:00:00
db:CERT/CCid:VU#676552date:2001-07-23T00:00:00
db:CERT/CCid:VU#890128date:2001-07-12T00:00:00
db:CERT/CCid:VU#642760date:2001-07-12T00:00:00
db:CERT/CCid:VU#555464date:2001-07-12T00:00:00
db:CERT/CCid:VU#310816date:2001-06-01T00:00:00
db:VULHUBid:VHN-3248date:2001-07-02T00:00:00
db:BIDid:2636date:2001-04-18T00:00:00
db:CNNVDid:CNNVD-200107-020date:2001-07-02T00:00:00
db:NVDid:CVE-2001-0429date:2001-07-02T04:00:00