{"vuid":"VU#363374","idnumber":"363374","name":"Cisco CSS 11000 Series Content Services Switch vulnerable to DoS via malformed UDP packets","keywords":["Cisco CSS 11000 Series Content Services Switch","WebNS","DoS","denial of service","reload switch","malformed UDP packets","port 5002/udp","management port","CSCed45747"],"overview":"Several models of the Cisco Content Services Switch contain a vulnerability in their management interface that allows an attacker to restart the switch, resulting in a denial of service attack.","clean_desc":"The Cisco CSS 11000 Series Content Services Switches contain a vulnerability in their handling of malformed UDP packets. An attacker with access to the management port of an affected switch can send a UDP packet to the app-udp port (5002/udp) that will cause the switch to restart. This vulnerability affects CSS 11000 Series switches that run versions 5.0(x) and 6.10(x) of Cisco WebNS, a service that allows the CSS switch to be configured remotely using an HTML-based application. Cisco reports that an attacker must have access to the management port of an affected switch, and that this interface is not accessible through other ports on the switch. Therefore, the attacker must have physical access to the switch or to an out-of-band management network that it is connected to. For further details, please see the Cisco Advisory.","impact":"Attackers with access to the management interface of an affected switch can restart it repeatedly, resulting in a denial of service.","resolution":"Upgrade to a newer version of WebNS. For systems running version 5.0(x) of WebNS, upgrade to 05.0(04.07)S or later. For systems running version 6.10(x) of WebNS, upgrade to 06.10(02.05)S or later.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \nthe Cisco Systems Product Security Incident Response Team (\nPSIRT","author":"This document was written by Damon Morda and Jeffrey P. Lanza.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20040304-css.shtml","http://secunia.com/advisories/11045/","http://www.cisco.com/univercd/cc/td/doc/product/webscale/css/css_610/advcggd/proximty.htm","http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_user_guide09186a00800b3d8e.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-04T20:19:06Z","publicdate":"2004-03-04T00:00:00Z","datefirstpublished":"2004-03-05T16:24:03Z","dateupdated":"2004-07-29T13:27:50Z","revision":30,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"12","cam_impact":"5","cam_easeofexploitation":"15","cam_attackeraccessrequired":"5","cam_scorecurrent":"1.85625","cam_scorecurrentwidelyknown":"2.278125","cam_scorecurrentwidelyknownexploited":"3.965625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.85625,"vulnote":null}