Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CISCO >> CSCdp35794


Vulnerability Assessment Details

CSCdp35794

Vulnerability Assessment Summary
Uses SNMP to determine if a flaw is present

Detailed Explanation for this Vulnerability Assessment


A defect in Cisco IOS Software running on all models of Gigabit
Switch Routers (GSRs) configured with Gigabit Ethernet or Fast
Ethernet cards may cause packets to be forwarded without correctly
evaluating configured access control lists (ACLs). In addition to
circumventing the access control lists, it is possible to stop an
interface from forwarding any packets, thus causing a denial of
service.


This vulnerability is documented as Cisco bug ID CSCdp35794.

Solution :
http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml
Network Security Threat Level: High

*** As Nessus solely relied on the banner of the remote host
*** this might be a false positive


Networks Security ID: 1541

Vulnerability Assessment Copyright: This script is (C) 2002 Renaud Deraison

Cables, Connectors

TP-Link TL-PS110P Fast Ethernet 10/100Mbps Print Server
$20.0
TP-Link TL-PS110P Fast Ethernet 10/100Mbps Print Server pictureIntel Xeon Tower Quad Core Server System E3-1225 v5 3.3GH Dell PowerEdge T30 1TB
$489.99
Intel Xeon Tower Quad Core Server System E3-1225 v5 3.3GH Dell PowerEdge T30 1TB pictureDL360 GEN10 XEON-G 5118 KIT
$1714.41
DL360 GEN10 XEON-G 5118 KIT pictureTP-Link TL-PS110P Fast Ethernet 10/100Mbps Print Server
$30.0
TP-Link TL-PS110P Fast Ethernet 10/100Mbps Print Server picture


Discussions

No Discussions have been posted on this vulnerability.