![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10980 |
Category: | CISCO |
Title: | CSCdt62732 |
Summary: | NOSUMMARY |
Description: | Description: When an 802.1x (IEEE standard for port based network access control) frame is received by an affected Catalyst 5000 series switch on a STP (Spanning Tree Protocol) blocked port it is forwarded in that VLAN (Virtual Local Area Network) instead of being dropped. This causes a performance impacting 802.1x frames network storm in that part of the network, which is made up of the affected Catalyst 5000 series switches. This network storm only subsides when the source of the 802.1x frames is removed or one of the workarounds in the workaround section is applied. This vulnerability is documented as Cisco bug ID CSCdt62732. Solution : http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
BugTraq ID: 2604 Common Vulnerability Exposure (CVE) ID: CVE-2001-0429 http://www.securityfocus.com/bid/2604 Computer Incident Advisory Center Bulletin: L-072 http://www.ciac.org/ciac/bulletins/l-072.shtml Cisco Security Advisory: 20010416 Catalyst 5000 Series 802.1x Vulnerability http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml XForce ISS Database: cisco-catalyst-8021x-dos(6379) https://exchange.xforce.ibmcloud.com/vulnerabilities/6379 |
Copyright | This script is (C) 2002 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |