{"vuid":"VU#855195","idnumber":"855195","name":"Cisco SN 5420 Storage Router vulnerable to DoS via fragmented packet sent over Gigabit interface","keywords":["Cisco SN 5420 Storage Router","DoS","denial of service","fragmented packet","Gigabit interface"],"overview":"It is possible to cause a denial of service of the Cisco SN 5420 Storage Router by sending a fragmented packet over the Gigabit interface.","clean_desc":"A vulnerability has been discovered in the Cisco SN 5420 Storage Router software versions 1.1(5) and earlier. By sending a fragmented packet over the Gigabit interface, an intruder can cause a denial of service. Cisco has released an advisory to address this issue; it is available at http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml.","impact":"An attacker can cause a denial of service against the Cisco SN 5420 Storage Router.","resolution":"This vulnerability is fixed in release 1.1(7) of the software. Please see Cisco's advisory for instructions on how to obtain the updated software for free. Cisco notes that version 1.1(6) of the software was never released.","workarounds":"","sysaffected":"","thanks":"Our thanks to Cisco for the information provided in their advisory.","author":"This document was written by Jason Rafail.","public":["http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml","http://www.securityfocus.com/bid/3833"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-01-09T22:13:11Z","publicdate":"2002-01-09T00:00:00Z","datefirstpublished":"2002-01-14T15:40:56Z","dateupdated":"2002-01-14T22:37:57Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"14","cam_attackeraccessrequired":"13","cam_scorecurrent":"2.559375","cam_scorecurrentwidelyknown":"3.07125","cam_scorecurrentwidelyknownexploited":"5.11875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.559375,"vulnote":null}