ID

VAR-200512-0083


CVE

CVE-2005-4441


TITLE

Cisco IOS of PVLAN In the protocol Traffic spoofing and segment avoidance vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2005-000743

DESCRIPTION

The PVLAN protocol allows remote attackers to bypass network segmentation and spoof PVLAN traffic via a PVLAN message with a target MAC address that is set to a gateway router, which causes the packet to be sent to the router, where the source MAC is modified, aka "Modification of the MAC spoofing PVLAN jumping attack," as demonstrated by pvlan.c. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ VLAN (Virtual LAN) Is LAN By setting a virtual group different from the physical connection form, LAN The terminal has a switch function MAC Address or IP Groups according to address, protocol used, etc. Also, PVLAN (Private VLAN) Is more than one VLAN Is a function that configures one subnet by combining IEEE Standardized by VLAN Standard of 802.1q Is Cisco IOS Works Cisco Catalyst And many other switching devices. 802.1q On the frame flowing through the network VLAN Identification ID ( tag ) Which switch is VLAN Between multiple switches VLAN Can be configured. Cisco IOS Implemented in VLAN/PVLAN Has the following security issues that allow it to communicate to hosts on different isolated segments: 1) Intentionally created 2 Horn IEEE 802.1q When a packet containing a tag is sent, VLAN There is an issue where it is possible to send packets to hosts on segments separated by. In addition, hosts that can communicate with the target host in packets that exploit these issues ( Host managed by attacker ) From IP By spoofing the address, it is possible to control the destination of response packets from the target host. When used by a remote attacker, as a result, the attacker may gain access to a target host that is otherwise inaccessible and attempt further attacks.Please refer to the “Overview” for the impact of this vulnerability. Pvlan Protocol is prone to a security bypass vulnerability

Trust: 1.98

sources: NVD: CVE-2005-4441 // JVNDB: JVNDB-2005-000743 // BID: 88928 // VULMON: CVE-2005-4441

AFFECTED PRODUCTS

vendor:pvlan protocolmodel:pvlan protocolscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.8

vendor:pvlan protocolmodel:pvlan protocolscope: - version: -

Trust: 0.6

vendor:pvlanmodel:protocol pvlan protocolscope:eqversion:0

Trust: 0.3

sources: BID: 88928 // JVNDB: JVNDB-2005-000743 // CNNVD: CNNVD-200512-434 // NVD: CVE-2005-4441

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-4441
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-200512-434
value: MEDIUM

Trust: 0.6

VULMON: CVE-2005-4441
value: MEDIUM

Trust: 0.1

VULMON: CVE-2005-4441
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2005-4441 // JVNDB: JVNDB-2005-000743 // CNNVD: CNNVD-200512-434 // NVD: CVE-2005-4441

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-4441

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-434

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200512-434

CONFIGURATIONS

sources: NVD: CVE-2005-4441

PATCH

title:cisco-response-20051220-pvlanurl:http://www.cisco.com/warp/public/707/cisco-response-20051220-pvlan.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2005-000743

EXTERNAL IDS

db:NVDid:CVE-2005-4441

Trust: 2.8

db:JVNDBid:JVNDB-2005-000743

Trust: 0.8

db:BUGTRAQid:20051219 RE: MAKING UNIDIRECTIONAL VLAN AND PVLAN JUMPING BIDIRECTIONAL

Trust: 0.6

db:BUGTRAQid:20051219 MAKING UNIDIRECTIONAL VLAN AND PVLAN JUMPING BIDIRECTIONAL

Trust: 0.6

db:FULLDISCid:20051219 MAKING UNIDIRECTIONAL VLAN AND PVLAN JUMPING BIDIRECTIONAL

Trust: 0.6

db:CNNVDid:CNNVD-200512-434

Trust: 0.6

db:BIDid:88928

Trust: 0.4

db:VULMONid:CVE-2005-4441

Trust: 0.1

sources: VULMON: CVE-2005-4441 // BID: 88928 // JVNDB: JVNDB-2005-000743 // CNNVD: CNNVD-200512-434 // NVD: CVE-2005-4441

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2005-december/040333.html

Trust: 2.0

url:http://www.securityfocus.com/archive/1/419831/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/419834/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/419834/100/0/threaded

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/419831/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-4441

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-4441

Trust: 0.8

url:http://www.securiteam.com/securitynews/6l00o00euc.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.securityfocus.com/bid/88928

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2005-4441 // BID: 88928 // JVNDB: JVNDB-2005-000743 // CNNVD: CNNVD-200512-434 // NVD: CVE-2005-4441

CREDITS

Unknown

Trust: 0.3

sources: BID: 88928

SOURCES

db:VULMONid:CVE-2005-4441
db:BIDid:88928
db:JVNDBid:JVNDB-2005-000743
db:CNNVDid:CNNVD-200512-434
db:NVDid:CVE-2005-4441

LAST UPDATE DATE

2022-05-04T09:54:10.847000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2005-4441date:2018-10-19T00:00:00
db:BIDid:88928date:2005-12-20T00:00:00
db:JVNDBid:JVNDB-2005-000743date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200512-434date:2006-01-10T00:00:00
db:NVDid:CVE-2005-4441date:2018-10-19T15:40:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2005-4441date:2005-12-21T00:00:00
db:BIDid:88928date:2005-12-20T00:00:00
db:JVNDBid:JVNDB-2005-000743date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200512-434date:2005-12-20T00:00:00
db:NVDid:CVE-2005-4441date:2005-12-21T02:03:00