Описание
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4775
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28925
- http://secunia.com/advisories/21896
- http://secunia.com/advisories/21902
- http://securitytracker.com/id?1016843
- http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml
- http://www.kb.cert.org/vuls/id/175148
- http://www.osvdb.org/28776
- http://www.phenoelit.de/stuff/CiscoVTP.txt
- http://www.securityfocus.com/archive/1/445896/100/0/threaded
- http://www.securityfocus.com/archive/1/445938/100/0/threaded
- http://www.securityfocus.com/bid/19998
- http://www.vupen.com/english/advisories/2006/3600
EPSS
CVE ID
Связанные уязвимости
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
EPSS