CVE-2001-0019
CVSS2.1
发布时间 :2001-02-12 00:00:00
修订时间 :2008-09-05 16:23:03
NMCOS    

[原文]Arrowpoint (aka Cisco Content Services, or CSS) allows local users to cause a denial of service via a long argument to the "show script," "clear script," "show archive," "clear archive," "show log," or "clear log" commands.


[CNNVD]Cisco Content服务Switch超长文件名服务拒绝漏洞(CNNVD-200102-037)

        Arrowpoint(也称为Cisco Content Services或CSS)存在漏洞。本地用户可以借助 "show script," "clear script," "show archive," "clear archive," "show log," 或"clear log"命令的超长参数导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:cisco:content_services_switch
cpe:/h:cisco:arrowpointCisco Arrowpoint

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0019
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0019
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200102-037
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/warp/public/707/arrowpoint-cli-filesystem-pub.shtml
(VENDOR_ADVISORY)  CISCO  20010131 Cisco Content Services Switch Vulnerability
http://www.atstake.com/research/advisories/2001/a013101-1.txt
(VENDOR_ADVISORY)  ATSTAKE  A013101-1

- 漏洞信息

Cisco Content服务Switch超长文件名服务拒绝漏洞
低危 其他
2001-02-12 00:00:00 2005-10-20 00:00:00
本地  
        Arrowpoint(也称为Cisco Content Services或CSS)存在漏洞。本地用户可以借助 "show script," "clear script," "show archive," "clear archive," "show log," 或"clear log"命令的超长参数导致服务拒绝。

- 公告与补丁

        Upgrades available:
        Cisco WebNS 3.0
        
        Cisco WebNS 4.0
        

- 漏洞信息

8814
Cisco Content Services Multiple Command Long Argument DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-01-31 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco Content Service Switch Long Filename Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 2330
No Yes
2001-01-31 12:00:00 2009-07-11 04:46:00
This vulnerability was announced to Bugtraq in a Cisco Security Advisory on January 31, 2001. It was initially discovered by Ollie Whitehouse <ollie@atstake.com>.

- 受影响的程序版本

Cisco WebNS 4.0
+ Cisco CSS11000 Content Services Switch
+ Cisco CSS11050 Content Services Switch
+ Cisco CSS11150 Content Services Switch
+ Cisco CSS11501 Content Services Switch
+ Cisco CSS11503 Content Services Switch
+ Cisco CSS11506 Content Services Switch
+ Cisco CSS11800 Content Services Switch
Cisco WebNS 3.0
+ Cisco CSS11000 Content Services Switch
+ Cisco CSS11050 Content Services Switch
+ Cisco CSS11150 Content Services Switch
+ Cisco CSS11501 Content Services Switch
+ Cisco CSS11503 Content Services Switch
+ Cisco CSS11506 Content Services Switch
+ Cisco CSS11800 Content Services Switch

- 漏洞讨论

The Cisco Content Services (CSS) switches are hardware designed to provide enhanced web services for e-commerece and Web Content delivery using the Cisco Web Network Services (Web NS). The CSS switch is distributed by Cisco Systems.

A problem in the CSS could allow a local user to deny service to legitimate users. The problem occurs in the handling of input by local users. A user must have access to the switch command line interface prior to launching an attack, but not have administrative privileges. Upon connecting to a non-privileged account, a user can locally execute a command on the switch which requires a file name as an argument. Upon specifying a filename that is the maximum size of the filename buffer, the switch reboots and starts system checks.

This vulnerability makes it possible for a user with malicious intentions to connect to a switch granting sufficient privileges, and execute a command that could deny service to legitimate network users. This vulnerability affects CSS switches 11050, 11150, and 11800.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Upgrades available:


Cisco WebNS 3.0

Cisco WebNS 4.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站