Cisco Catalyst Switches Embedded HTTP Server Long HTTP Request DoS (CSCdy26428)

high Nessus Plugin ID 11285

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The remote switch is vulnerable to a buffer overflow in its embedded HTTP server. An attacker may use this flaw to make your switch reboot continuously, resulting in a denial of service.

This vulnerability is documented with the CISCO bug ID CSCdy26428.

Solution

Apply the update or workaround as recommend in the vendor advisory.

See Also

http://www.nessus.org/u?9ddf57aa

Plugin Details

Severity: High

ID: 11285

File Name: CSCdy26428.nasl

Version: 1.23

Type: remote

Family: CISCO

Published: 2/28/2003

Updated: 4/5/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2002-1222

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community, CISCO/model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/16/2002

Vulnerability Publication Date: 10/16/2002

Reference Information

CVE: CVE-2002-1222

BID: 5976