{"cisco": [{"lastseen": "2019-05-29T15:32:25", "bulletinFamily": "software", "description": "A vulnerability in Cisco IOS on Catalysts Switches and Nexus 9300 Series Switches could allow an unauthenticated, adjacent attacker to cause a Layer 2 network storm.\n\nThe vulnerability occurs because the software forwards Layer 2 frames that should be consumed by the first hop. An attacker could exploit this vulnerability by injecting the Layer 2 frame into the network segment. An exploit could allow the attacker to cause a Layer 2 network storm and impact the availability of the switches.\n\nThere are workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\n\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios[\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios\"]", "modified": "2016-12-06T14:59:39", "published": "2016-12-07T16:00:00", "id": "CISCO-SA-20161207-IOS", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios", "type": "cisco", "title": "Cisco IOS Frame Forwarding Denial of Service Vulnerability", "cvss": {"score": 6.1, "vector": "AV:A/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-10-09T15:19:58", "bulletinFamily": "scanner", "description": "A vulnerability in Cisco IOS on Catalysts Switches and Nexus 9300 Series\nSwitches could allow an unauthenticated, adjacent attacker to cause a Layer 2 network storm.", "modified": "2019-10-09T00:00:00", "published": "2016-12-08T00:00:00", "id": "OPENVAS:1361412562310106446", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310106446", "title": "Cisco IOS Frame Forwarding Denial of Service Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Cisco IOS Frame Forwarding Denial of Service Vulnerability\n#\n# Authors:\n# Christian Kuersteiner <christian.kuersteiner@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/o:cisco:ios\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.106446\");\n script_cve_id(\"CVE-2016-6473\");\n script_tag(name:\"cvss_base\", value:\"6.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:L/Au:N/C:N/I:N/A:C\");\n script_version(\"2019-10-09T06:43:33+0000\");\n\n script_name(\"Cisco IOS Frame Forwarding Denial of Service Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n\n script_tag(name:\"summary\", value:\"A vulnerability in Cisco IOS on Catalysts Switches and Nexus 9300 Series\nSwitches could allow an unauthenticated, adjacent attacker to cause a Layer 2 network storm.\");\n\n script_tag(name:\"insight\", value:\"The vulnerability occurs because the software forwards Layer 2 frames that\nshould be consumed by the first hop. An attacker could exploit this vulnerability by injecting the Layer 2 frame\ninto the network segment.\");\n\n script_tag(name:\"impact\", value:\"An exploit could allow the attacker to cause a Layer 2 network storm and\nimpact the availability of the switches.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2019-10-09 06:43:33 +0000 (Wed, 09 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-12-08 14:16:20 +0700 (Thu, 08 Dec 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"This script is Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_ssh_cisco_ios_get_version.nasl\");\n script_mandatory_keys(\"cisco_ios/version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) ) exit( 0 );\n\naffected = make_list(\n '15.0(2)SE8',\n '15.2(3)E',\n '15.2(2)E1',\n '15.2(3)E1',\n '15.2(2)E2',\n '15.2(2a)E1',\n '15.2(3a)E' );\n\nforeach af ( affected )\n{\n if( version == af )\n {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n\n", "cvss": {"score": 6.1, "vector": "AV:A/AC:L/Au:N/C:N/I:N/A:C"}}]}