Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DOS:NETDEV:CATALYST-SSH-DOS

Severity

High

Recommended

No

Recommended Action

Drop

Category

DOS

Keywords

Cisco Catalyst SSH Protocol Mismatch DoS

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DOS: Cisco Catalyst SSH Protocol Mismatch DoS


This signature detects attempts to exploit a known vulnerability against a Cisco Catalyst switch. When negotiating an SSH connection with a Cisco Catalyst switch, attackers can use the thong.pl exploit to send an invalid SSH header reply, hanging the service and creating a denial-of-service (DoS) condition.

Extended Description

Software versions 6.1(1), 6.1(1a) and 6.1(1b) for Catalyst 4000, 5000, and 6000 devices that support SSH and 3 DES encryption contain a vulnerability that may allow an attacker to cause a denial of service. If a connection is made to the SSH service on a vulnerable Catalyst device and the protocol mismatch error occurs, the device will be reset.

Affected Products

  • Cisco Catalyst 4000 6.1.0 (1)
  • Cisco Catalyst 4000 6.1.0 (1A)
  • Cisco Catalyst 4000 6.1.0 (1B)
  • Cisco Catalyst 4000
  • Cisco Catalyst 5000 6.1.0 (1)
  • Cisco Catalyst 5000 6.1.0 (1A)
  • Cisco Catalyst 5000 6.1.0 (1B)
  • Cisco Catalyst 5000
  • Cisco Catalyst 6000 6.1.0 (1)
  • Cisco Catalyst 6000 6.1.0 (1A)
  • Cisco Catalyst 6000 6.1.0 (1B)
  • Cisco Catalyst 6000

References

  • BugTraq: 2117
  • CVE: CVE-2001-0080
  • URL: http://www.securiteam.com/securitynews/6U00L0A0KS.html
  • URL: http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out