{"vuid":"VU#548968","idnumber":"548968","name":"Multiple Cisco ONS control cards fail to properly handle malformed SNMP packets","keywords":["Cisco","ONS","XTC","TCC/TCC+/TCC2","TCCi/TCC2","DoS","denial of service","malformed SNMP packets"],"overview":"A vulnerability exists in multiple control cards used by Cisco ONS devices. This vulnerability could allow a remote attacker to cause a denial-of-service condition.","clean_desc":"Cisco's Optical Networking product line consists of a series of devices designed to offer high-bandwidth data services. These optical devices are managed through a series of control cards, which vary depending on the model of the device. There is a vulnerability in the way the XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control cards handle malformed SNMP packets. By sending specially crafted SNMP packets to a vulnerable optical device, a remote attacker could cause the control cards to reset. Vulnerable\nCisco ONS 15327 Edge Optical Transport Platform releases: 4.1(0) to 4.1(2)\n4.0(0) to 4.0(2)\n3.x(x) and earlier Cisco ONS 15454 Optical Transport Platform releases: 4.5(x)\n4.1(0) to 4.1(2)\n4.0(0) to 4.0(2)\n3.x(x)\nearlier than 2.3(5) Cisco ONS 15454 SDH Multiplexer Platform releases: 4.5(x)\n4.1(0) to 4.1(2)\n4.0(0) to 4.0(2)\n3.x(x)\nearlier than 2.3(5) Not vulnreable\nCisco ONS 15600 Multiservice Switching Platform","impact":"A remote, unauthenticated attacker could cause control cards to reset on an affected optical device. Repeated exploitation of this vulnerability could result in a denial of service. For more information on the impact of this vulnerability, please refer to the \"Impact\" section of the Cisco Advisory.","resolution":"Upgrade\nPlease refer to the \"Software Versions and Fixes\" section of the Cisco Advisory for more information on upgrading.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \nthe Cisco Systems Product Security Incident Response Team (\nPSIRT","author":"This document was written by Damon Morda based on information provided by Cisco.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml","http://www.cisco.com/en/US/products/hw/optical/","http://secunia.com/advisories/12117/","http://www.securitytracker.com/alerts/2004/Jul/1010749.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-07-21T18:56:47Z","publicdate":"2004-07-21T00:00:00Z","datefirstpublished":"2004-07-27T19:15:35Z","dateupdated":"2004-08-05T17:54:53Z","revision":24,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"14","cam_impact":"6","cam_easeofexploitation":"10","cam_attackeraccessrequired":"17","cam_scorecurrent":"8.0325","cam_scorecurrentwidelyknown":"9.37125","cam_scorecurrentwidelyknownexploited":"14.72625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.0325,"vulnote":null}