ID

VAR-200111-0002


CVE

CVE-2001-0895


TITLE

Cisco IOS and CatOS fail to properly validate ARP packets thereby overwriting device's MAC address in ARP table

Trust: 0.8

sources: CERT/CC: VU#399355

DESCRIPTION

Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table. There is a denial-of-service vulnerability in specific versions of Cisco IOS or CatOS. IOS is the Internetwork Operating System, distributed by Cisco Systems. A problem in the operating system has been discovered that could lead to a user on a system local to the router denying service all network users. The problem is in the handling of multiple ARP requests. It discontinues all other ARP entries afterwards. This makes it possible for a user on a network local to the router to deny service to users on all sides of the router. This vulnerability affects the following Cisco systems: Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, ubr900, 1000, 1400, 1500, 1600, 1700, 2500, 2600, 3000, 3600, 3800, 4000, 4500, 4700, AS5200, AS5300, AS5800, 6400, 7000, 7200, ubr7200, 7500, and 12000 series. Most recent versions of the LS1010 ATM switch. The Catalyst 6000. The Catalyst 2900XL LAN switch. The Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are affected. The Cisco DistributedDirector. Vulnerabilities exist in several Cisco networking products

Trust: 1.98

sources: NVD: CVE-2001-0895 // CERT/CC: VU#399355 // BID: 3547 // VULHUB: VHN-3702

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst 5000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 2900xlscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 3500xlscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 2950scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 6000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 2948g-l3scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:distributed directorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 3550scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 4000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 8500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:catalyst 4908g-l3scope:eqversion:*

Trust: 1.0

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:catalyst 5000scope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 4908g-l3scope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 4000scope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 2948g-l3scope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 3550scope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 8500scope: - version: -

Trust: 0.6

vendor:ciscomodel:distributed directorscope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 3500xlscope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 2900xlscope: - version: -

Trust: 0.6

vendor:ciscomodel:catalyst 6000scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xx

Trust: 0.3

vendor:ciscomodel:ios 12.1xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 0.3

vendor:ciscomodel:ios 12.1xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1aascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 0.3

vendor:ciscomodel:ios 12.0xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0w5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.3

sources: CERT/CC: VU#399355 // BID: 3547 // CNNVD: CNNVD-200111-011 // NVD: CVE-2001-0895

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0895
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#399355
value: 25.31

Trust: 0.8

CNNVD: CNNVD-200111-011
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3702
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0895
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3702
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#399355 // VULHUB: VHN-3702 // CNNVD: CNNVD-200111-011 // NVD: CVE-2001-0895

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0895

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200111-011

TYPE

Design Error

Trust: 0.9

sources: BID: 3547 // CNNVD: CNNVD-200111-011

EXTERNAL IDS

db:BIDid:3547

Trust: 2.8

db:CERT/CCid:VU#399355

Trust: 2.5

db:NVDid:CVE-2001-0895

Trust: 1.7

db:OSVDBid:807

Trust: 1.7

db:CNNVDid:CNNVD-200111-011

Trust: 0.7

db:CISCOid:20011115 CISCO IOS ARP TABLE OVERWRITE VULNERABILITY

Trust: 0.6

db:XFid:7547

Trust: 0.6

db:VULHUBid:VHN-3702

Trust: 0.1

sources: CERT/CC: VU#399355 // VULHUB: VHN-3702 // BID: 3547 // CNNVD: CNNVD-200111-011 // NVD: CVE-2001-0895

REFERENCES

url:http://www.cisco.com/warp/public/707/ios-arp-overwrite-vuln-pub.shtml

Trust: 3.5

url:http://www.securityfocus.com/bid/3547

Trust: 3.5

url:http://www.kb.cert.org/vuls/id/399355

Trust: 2.7

url:http://www.osvdb.org/807

Trust: 2.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7547

Trust: 2.1

url:http://xforce.iss.net/xforce/xfdb/7547

Trust: 0.6

sources: CERT/CC: VU#399355 // VULHUB: VHN-3702 // CNNVD: CNNVD-200111-011 // NVD: CVE-2001-0895

CREDITS

This vulnerability was announced in a Cisco Security Advisory on November 15, 2001.

Trust: 0.9

sources: BID: 3547 // CNNVD: CNNVD-200111-011

SOURCES

db:CERT/CCid:VU#399355
db:VULHUBid:VHN-3702
db:BIDid:3547
db:CNNVDid:CNNVD-200111-011
db:NVDid:CVE-2001-0895

LAST UPDATE DATE

2024-11-22T22:59:29.828000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#399355date:2001-11-27T00:00:00
db:VULHUBid:VHN-3702date:2017-10-10T00:00:00
db:BIDid:3547date:2001-11-15T00:00:00
db:CNNVDid:CNNVD-200111-011date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0895date:2024-11-20T23:36:22.940

SOURCES RELEASE DATE

db:CERT/CCid:VU#399355date:2001-11-15T00:00:00
db:VULHUBid:VHN-3702date:2001-11-15T00:00:00
db:BIDid:3547date:2001-11-15T00:00:00
db:CNNVDid:CNNVD-200111-011date:2001-11-15T00:00:00
db:NVDid:CVE-2001-0895date:2001-11-15T05:00:00