Short Name |
DOS:NETDEV:CISCO-5000 |
---|---|
Severity |
Major |
Recommended |
No |
Category |
DOS |
Keywords |
CISCO Catalyst 5000 |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known software vulnerability in Cisco Catalyst LAN switches. Versions prior to Cisco Catalyst 12xx supervisor 4.30, 29xx supervisor 2.1.6, and 5xxx supervisor 2.1.6 are susceptible. Attackers can remotely connect to TCP/7161 and reload the switch supervisor module, causing a denial-of-service (DoS).
This desciprion was taken from the Cisco advisory. A remote attacker who knows how to exploit this vulnerability, and who can make a connection to TCP port 7161 on an affected switch, can cause the supervisor module of that switch to reload. While the supervisor is reloading, the switch will not forward traffic, and the attack will therefore deny service to the equipment attached to the switch. The switch will recover automatically, but repeated attacks can extend the denial of service indefinitely.