Executive Summary

Summary
Title DLSw Vulnerability
Informations
Name cisco-sa-20070110-dlsw First vendor Publication 2007-01-04
Vendor Cisco Last vendor Modification 2007-04-20
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability exists in the Data-link Switching (DLSw) feature in Cisco IOS where an invalid value in a DLSw message could result in a reload of the DLSw device. Successful exploitation of this vulnerability requires that an attacker be able to establish a DLSw connection to the device.

Original Source

Url : http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5714
 
Oval ID: oval:org.mitre.oval:def:5714
Title: Cisco IOS 12.4 Malformed DLSw Message DoS Vulnerability
Description: The Data-link Switching (DLSw) feature in Cisco IOS 11.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via "an invalid value in a DLSw message... during the capabilities exchange."
Family: ios Class: vulnerability
Reference(s): CVE-2007-0199
Version: 1
Platform(s): Cisco IOS
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Hardware 286
Os 5345

Open Source Vulnerability Database (OSVDB)

Id Description
32683 Cisco IOS Data-link Switching (DLSw) Capabilities Exchange Remote DoS

Cisco IOS contains a flaw that may allow a remote attacker to crash the router. The issue is due to the Data-link Switching (DLSw) feature not properly handling DLSw messages. During the capabilities exchange, if an attacker sends a malformed packet with an invalid value, the router will crash.

Nessus® Vulnerability Scanner

Date Description
2010-09-01 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20070110-dlswhttp.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote router can be crashed remotely.
File : CSCsf28840.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 10:21:50
  • Multiple Updates