Korean
<< Back
VID 29042
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco CatOS has an embedded HTTP server buffer overflow vulnerability(CISCO bug ID CSCdy26428).
The exploitation of this issue can result in a software forced reset of this device. Repeated exploitation may lead to a denial of service until the workaround for this vulnerability has been implemented or a fixed version of software has been loaded onto the device.
If the HTTP server is enabled on a Cisco Catalyst switch running an affected CiscoView image, by sending an overly long HTTP query, a remote attacker can cause a buffer overflow and result in a software reset of the switch.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml

* Platforms Affected:
Cisco CatOS software versions 5.4 through 7.3 that contain an embedded HTTP server
Recommendation Upgrade to the latest version of Cisco CatOS (5.5(17) or 6.3(9) or 7.4(1) and later), as listed in Cisco Security Advisory, http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml .
Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/public/sw-center/sw-lan.shtml .

As a workaround, disable the HTTP server on the Cisco switch. For example:

Router(config)# set ip http server disable
Related URL CVE-2002-1222 (CVE)
Related URL 5976 (SecurityFocus)
Related URL 10382 (ISS)