SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Alcatel-Lucent OmniSwitch Vendors:   Alcatel-Lucent
Alcatel OmniSwitch 7000 Can Be Crashed By Remote Users Conducting Nessus Scans
SecurityTracker Alert ID:  1009211
SecurityTracker URL:  http://securitytracker.com/id/1009211
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 26 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 7700, 7800, possibly 8800; AOS 5.1.4.27.R03
Description:   A denial of service vulnerability was reported in the Alcatel OmniSwitch 7000 series devices. A remote user can cause the switch to reboot.

It is reported that a remote user can run a Nessus scan against the switch to trigger the flaw and cause the switch to reboot.

The report states that port numbers 80, 260, 261, and 443 are affected.

Impact:   A remote user can cause the switch to reboot.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.ind.alcatel.com/specs/index.cfm?cnt=omniswitch_7000_spec (Links to External Site)
Cause:   Exception handling error

Message History:   None.


 Source Message Contents

Subject:  Alcatel Omniswitch 7000 series




Running Nessus 2.0.9 against Alcatel 7000 series causing a swith to reboot  via buffer overflow(?).

Alcatel has multiple services running on the background, with no option to shut them down. Vulnerable ports:  80, 260, 261, 443. Disabling
 a service via qos policy (suggested by  Alcatel) does just a minor relief, since many other possible vulnerabilities cause the same
 outcome. 

Systems affected: 7700, 7800, possibly 8800 (have not tested due to the critical switch location)

Tested System info:
--------------------
FPGA : 38
BootROM Version: 5.1.4.67.R01
OS: 5.1.4.27.R03

Test configuration:
-------------------
ports 1-1024
no safe-checks (NOTE: safe-checks occasionally crash the switch as well)
1870 plugins enable
all scans enable

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC