CVE-2002-1501
CVSS5.0
发布时间 :2003-04-02 00:00:00
修订时间 :2008-09-05 16:30:45
NMCOES    

[原文]The MPS functionality in Enterasys SSR8000 (Smart Switch Router) before firmware 8.3.0.10 allows remote attackers to cause a denial of service (crash) via multiple port scans to ports 15077 and 15078.


[CNNVD]Enterasys SSR8000 SmartSwitch端口扫描远程拒绝服务攻击漏洞(CNNVD-200304-044)

        
        SSR8000是一款由Enterasys开发和维护的SmartSwitch交换机。
        SSR8000交换机在处理端口被扫描情况下会变的不稳定,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        SSR8000交换机为了处理ATM的MPS代码监听TCP端口15077和15078,攻击者如果使用特殊TCP包来扫描15077和15078端口,可导致交换机变的不稳定,停止对正常请求的响应。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:enterasys:smartswitch_ssr8000:e8.2.0.0
cpe:/h:enterasys:smartswitch_ssr8000:e8.3.0.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1501
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1501
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-044
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5703
(VENDOR_ADVISORY)  BID  5703
http://www.iss.net/security_center/static/10096.php
(VENDOR_ADVISORY)  XF  smartswitch-portscan-dos(10096)
http://archives.neohapsis.com/archives/bugtraq/2002-09/0141.html
(VENDOR_ADVISORY)  BUGTRAQ  20020913 Scan against Enterasys SSR8000 crash the system
http://www.enterasys.com/support/techtips/tk0659-9.html
(VENDOR_ADVISORY)  MISC  http://www.enterasys.com/support/techtips/tk0659-9.html

- 漏洞信息

Enterasys SSR8000 SmartSwitch端口扫描远程拒绝服务攻击漏洞
中危 其他
2003-04-02 00:00:00 2005-05-13 00:00:00
远程  
        
        SSR8000是一款由Enterasys开发和维护的SmartSwitch交换机。
        SSR8000交换机在处理端口被扫描情况下会变的不稳定,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        SSR8000交换机为了处理ATM的MPS代码监听TCP端口15077和15078,攻击者如果使用特殊TCP包来扫描15077和15078端口,可导致交换机变的不稳定,停止对正常请求的响应。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用交换机的ACL控制策略限制用户对15077和15078端口的访问。
        厂商补丁:
        Enterasys
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.enterasys.com/

- 漏洞信息 (21791)

Enterasys SSR8000 SmartSwitch Port Scan Denial Of Service Vulnerability (EDBID:21791)
hardware dos
2002-09-13 Verified
0 Mella Marco
N/A [点击下载]
source: http://www.securityfocus.com/bid/5703/info

The SSR8000 is a SmartSwitch distributed and maintained by Enterasys.

It has been discovered that SSR8000 switches react unpredictably when portscanned. When these switches are scanned using specific types of TCP traffic, and scanned on certain ports, the switch becomes unstable. It has been reported that this can be reproduced consistently to cause the switch to crash. 

nmap -PT 10.2.1.1 -p '15077-15078' 		

- 漏洞信息

10063
Enterasys SSR8000 Router MPS Functionality Port Scan DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Availability
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-09-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Enterasys SSR8000 SmartSwitch Port Scan Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 5703
Yes No
2002-09-13 12:00:00 2009-07-11 05:06:00
Vulnerability discovery credited to Mella Marco <m.mella@saritel.it>.

- 受影响的程序版本

Enterasys SmartSwitch SSR8000 E8.3.0.4
Enterasys SmartSwitch SSR8000 E8.2.0.0

- 漏洞讨论

The SSR8000 is a SmartSwitch distributed and maintained by Enterasys.

It has been discovered that SSR8000 switches react unpredictably when portscanned. When these switches are scanned using specific types of TCP traffic, and scanned on certain ports, the switch becomes unstable. It has been reported that this can be reproduced consistently to cause the switch to crash.

- 漏洞利用

Exploit contributed by Mella Marco &lt;m.mella@saritel.it&gt;:

nmap -PT 10.2.1.1 -p '15077-15078'

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站