ID

VAR-200306-0131


TITLE

Avaya Cajun Network Switch Connection Delayed Remote Denial of Attack Service Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2003-1812

DESCRIPTION

Avaya Cajun offers a multiservice network switch system solution. Avaya Cajun switches do not properly handle 4,000 ports of abnormal communication, which can be exploited by remote attackers to delay the switch for a period of time. By connecting the switch 4000 port, sending the first 4 bytes represents a negative number, and packets exceeding 5 bytes can cause the switch to delay for a period of time. Multiple such packets can cause the switch to stop working and generate a denial of service. Because of this, an attacker may be able to cause the switch to stall for period of time

Trust: 0.81

sources: CNVD: CNVD-2003-1812 // BID: 7961

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2003-1812

AFFECTED PRODUCTS

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:avayamodel:g700 media gatewayscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:cajun p333 seriesscope:eqversion:3.12.0

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.12.1

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.11

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.10

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.9.1

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.8.2

Trust: 0.3

vendor:avayamodel:cajun p330 seriesscope:eqversion:3.8.1

Trust: 0.3

vendor:avayamodel:cajun p133 seriesscope:eqversion:2.6.1

Trust: 0.3

vendor:avayamodel:cajun p130 seriesscope:eqversion:2.9.1

Trust: 0.3

sources: CNVD: CNVD-2003-1812 // BID: 7961

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2003-1812
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2003-1812
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2003-1812

THREAT TYPE

network

Trust: 0.3

sources: BID: 7961

TYPE

Design Error

Trust: 0.3

sources: BID: 7961

EXTERNAL IDS

db:BIDid:7961

Trust: 0.9

db:CNVDid:CNVD-2003-1812

Trust: 0.6

sources: CNVD: CNVD-2003-1812 // BID: 7961

REFERENCES

url:http://marc.theaimsgroup.com/?l=bugtraq&m=105595189813418&w=2

Trust: 0.6

url:http://support.avaya.com/japple/css/japple?temp.groupid=128450&temp.selectedfamily=153415&temp.selectedproduct=153418&temp.selectedbucket=126995&temp.feedbackstate=askforfeedback&temp.documentid=15342

Trust: 0.3

url:http://support.avaya.com/japple/css/japple?page=avaya.css.csslvl1&ac.productfamily=-1&ac.productid=-1&temp.groupid=142804

Trust: 0.3

url:/archive/1/325582

Trust: 0.3

sources: CNVD: CNVD-2003-1812 // BID: 7961

CREDITS

Discovery credited to Jacek Lipkowski.

Trust: 0.3

sources: BID: 7961

SOURCES

db:CNVDid:CNVD-2003-1812
db:BIDid:7961

LAST UPDATE DATE

2022-05-17T01:52:13.515000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2003-1812date:2014-01-20T00:00:00
db:BIDid:7961date:2003-06-18T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2003-1812date:2003-06-18T00:00:00
db:BIDid:7961date:2003-06-18T00:00:00