{"vuid":"VU#175148","idnumber":"175148","name":"Cisco IOS fails to properly verify the VTP configuration revision number","keywords":["Cisco","IOS","integer overflow","VTP configuration revision handling"],"overview":"Cisco IOS fails to properly verify the VTP configuration revision number. This vulnerability may allow a remote, unauthenticated attacker to prevent changes to the VLAN database from being properly propagated throughout the VTP domain.","clean_desc":"Cisco's VLAN Trunking Protocol (VTP) provides the ability to manage the addition, deletion, and renaming of Virtual Local Area Networks (VLANs) across an entire network. VTP is supported on a number of different Cisco products in both the IOS and CatOS operating systems. According to Cisco Systems: Once the VTP configuration revision exceeds 0x7FFFFFFF, the output for the VTP configuration revision in show vtp status  (on an IOS device) or show vtp domain (on a CatOS device) will display as a negative number. Operation of the switch is not affected, however further changes to the VLAN database may not be properly propagated throughout the VTP domain. This vulnerability may be triggered by sending a crafted VTP packet with a change in the configuration revision to an affected switch on a trunk enabled port. The crafted packet must include the correct domain name and VTP domain password to be effective. Note that this vulnerability affects Switches and  Ethernet Switch Modules for Cisco 1800/2600/2800/3600/3700/3800 Series Routers running Cisco IOS software that have VTP Operating Mode as either \"server\" or \"client\" and Switches running CatOS. See Cisco Security Response cisco-sr-20060913-vtp for more detailed version information. Switches configured with VTP operating mode as \"transparent\" are not affected by this vulnerability","impact":"This vulnerability may allow a remote, unauthenticated attacker to prevent changes to the VLAN database from being properly propagated throughout the VTP domain.","resolution":"We are unaware of a complete solution to this problem. In the meantime, the following workarounds may help to mitigate this vulnerability.","workarounds":"Apply a VTP domain password See Cisco white paper SAFE Layer 2 Security In-Depth — Version 2 for information about setting a VTP domain password to prevent spoofed VTP summary advertisement messages from advertising an incorrect VLAN name. Exploitation Recovery Cisco provides methods of recovery in Cisco Security Response cisco-sr-20060913-vtp. These include changing VTP domain names on all switches and temporarily setting all VTP servers/clients to transparent mode.","sysaffected":"","thanks":"This issue was reported in \nCisco Security Response cisco-sr-20060913-vtp\n. Cisco credits FX of Phenoelit for reporting this issue.","author":"This document was written by Chris Taschner.","public":["http://secunia.com/advisories/21896/","http://www.phenoelit.de/stuff/CiscoVTP.txt","http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml","http://secunia.com/advisories/21902/","http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml#wp998892"],"cveids":["CVE-2006-4775"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-14T18:32:10Z","publicdate":"2006-09-13T00:00:00Z","datefirstpublished":"2006-09-27T20:38:36Z","dateupdated":"2006-09-27T20:38:48Z","revision":19,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"3.3665625","cam_scorecurrentwidelyknown":"4.2525","cam_scorecurrentwidelyknownexploited":"7.79625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.3665625,"vulnote":null}