ID
VAR-E-200307-0134
TITLE
Cisco Catalyst Non-Standard TCP Flags Remote Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
A problem with Cisco Catalyst switches has been reported in the handling of non-standard TCP packets. Because of this, an attacker may be able to deny legitimate user access to the switch.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5 | Trust: 3.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.1 | Trust: 2.7 |
vendor: | cisco | model: | catos csx | scope: | eq | version: | 5.3 | Trust: 2.4 |
vendor: | cisco | model: | catos csx | scope: | eq | version: | 5.2 | Trust: 1.2 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3 | Trust: 0.9 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.2 | Trust: 0.9 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.4 | Trust: 0.9 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.1 | Trust: 0.9 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5 | Trust: 0.9 |
vendor: | cisco | model: | catos | scope: | eq | version: | 7.1 | Trust: 0.6 |
vendor: | cisco | model: | catos csx | scope: | eq | version: | 5.1 | Trust: 0.6 |
vendor: | cisco | model: | catos | scope: | eq | version: | 7.4 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 7.1(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 7.1(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(5.10) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(5) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(3)x1 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(3)x | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.3(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.2(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.2(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.2(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.1(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.1(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.1(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 6.1(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(9) | Trust: 0.3 |
vendor: | cisco | model: | catos cv | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(8) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(7) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(6) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(5) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(13.5) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(13) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(12) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(11) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(10) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.5(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.4(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.4(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.4(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.4(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(7) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(6) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(5) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.2(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 5.1(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(9) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(8) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(7) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(6) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(5) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(4) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(13) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(12) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(11) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(10) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.5(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.4(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.2(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.2(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.1(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.1(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | eq | version: | 4.1(1) | Trust: 0.3 |
vendor: | cisco | model: | catalyst | scope: | eq | version: | 50005.5(13) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 8.1 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.6(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.6 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.5(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.5 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.4(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.3(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.3(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.3 | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 7.2(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 6.4(3) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 6.4(2) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 6.4(1) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 6.3(6) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 5.5(14) | Trust: 0.3 |
vendor: | cisco | model: | catos | scope: | ne | version: | 4.5(14) | Trust: 0.3 |
EXPLOIT
This issue may be exploited with one of several free, publicly available network testing utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Vulnerability disclosed by Cisco.
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 8149 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 8149 |
LAST UPDATE DATE
2022-07-27T09:34:31.217000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 8149 | date: | 2003-07-09T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 8149 | date: | 2003-07-09T00:00:00 |