Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Alcatel-Lucent OmniSwitch Vendors:   Alcatel-Lucent
Alcatel OmniSwitch 7000 Can Be Crashed By Remote Users Conducting Nessus Scans
SecurityTracker Alert ID:  1009211
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 26 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 7700, 7800, possibly 8800; AOS
Description:   A denial of service vulnerability was reported in the Alcatel OmniSwitch 7000 series devices. A remote user can cause the switch to reboot.

It is reported that a remote user can run a Nessus scan against the switch to trigger the flaw and cause the switch to reboot.

The report states that port numbers 80, 260, 261, and 443 are affected.

Impact:   A remote user can cause the switch to reboot.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Exception handling error

Message History:   None.

 Source Message Contents

Subject:  Alcatel Omniswitch 7000 series

Running Nessus 2.0.9 against Alcatel 7000 series causing a swith to reboot  via buffer overflow(?).

Alcatel has multiple services running on the background, with no option to shut them down. Vulnerable ports:  80, 260, 261, 443. Disabling
 a service via qos policy (suggested by  Alcatel) does just a minor relief, since many other possible vulnerabilities cause the same

Systems affected: 7700, 7800, possibly 8800 (have not tested due to the critical switch location)

Tested System info:
FPGA : 38
BootROM Version:

Test configuration:
ports 1-1024
no safe-checks (NOTE: safe-checks occasionally crash the switch as well)
1870 plugins enable
all scans enable


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC