var-199909-0003
Vulnerability from variot
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. The 802.1q standard is susceptible to issues that allow attackers to send and receive packets from one VLAN to another without authorization. By spoofing various Ethernet frame fields such as the source or destination MAC addresses, IP addresses, and VLAN tags, attackers may cause packets to traverse from one VLAN to another, and possibly back again. Attackers may also add multiple VLAN tags to packets to cause multiple routers to decapsulate the packets in unexpected ways, aiding the attacker in traversing VLANs. This issue allows attackers to traverse from one VLAN to another in an unauthorized fashion. As some users may utilize VLANs to segregate network segments containing differing security properties, this may have various consequences. This issue may be exacerbated by utilizing attacker-controlled external network hosts to bounce packets between VLANs
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-199909-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "11.2\\(8\\)sa5" }, { "model": "catalyst 2900 vlan", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "catalyst 2900 vlan", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "802.1q", "scope": null, "trust": 0.3, "vendor": "ieee", "version": null }, { "model": "ios sa5", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.2.8" }, { "model": "catalyst ws-c2924m-xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "BID", "id": "615" }, { "db": "CNNVD", "id": "CNNVD-199909-002" }, { "db": "NVD", "id": "CVE-1999-1129" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This research and the resulting post was sent to the Bugtraq mailing list by Dave Taylor \u003cdavid.taylor@alphawest.com.au\u003e \u0026 Steve Schuppp \u003cSteve.schupp@alphawest.com.au\u003e. Further research was provided by \"Andrew A. Vladimirov\" \u003cmlists@arhont.com\u003e, Arhont L", "sources": [ { "db": "CNNVD", "id": "CNNVD-199909-002" } ], "trust": 0.6 }, "cve": "CVE-1999-1129", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-1999-1129", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-1110", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-1999-1129", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-199909-002", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-1110", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-1110" }, { "db": "CNNVD", "id": "CNNVD-199909-002" }, { "db": "NVD", "id": "CVE-1999-1129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. The 802.1q standard is susceptible to issues that allow attackers to send and receive packets from one VLAN to another without authorization. \nBy spoofing various Ethernet frame fields such as the source or destination MAC addresses, IP addresses, and VLAN tags, attackers may cause packets to traverse from one VLAN to another, and possibly back again. Attackers may also add multiple VLAN tags to packets to cause multiple routers to decapsulate the packets in unexpected ways, aiding the attacker in traversing VLANs. \nThis issue allows attackers to traverse from one VLAN to another in an unauthorized fashion. As some users may utilize VLANs to segregate network segments containing differing security properties, this may have various consequences. \nThis issue may be exacerbated by utilizing attacker-controlled external network hosts to bounce packets between VLANs", "sources": [ { "db": "NVD", "id": "CVE-1999-1129" }, { "db": "BID", "id": "615" }, { "db": "VULHUB", "id": "VHN-1110" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-1999-1129", "trust": 2.0 }, { "db": "BID", "id": "615", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-199909-002", "trust": 0.7 }, { "db": "XF", "id": "3294", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "19990901 VLAN SECURITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-1110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-1110" }, { "db": "BID", "id": "615" }, { "db": "CNNVD", "id": "CNNVD-199909-002" }, { "db": "NVD", "id": "CVE-1999-1129" } ] }, "id": "VAR-199909-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-1110" } ], "trust": 0.01 }, "last_update_date": "2024-11-22T23:12:12.687000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-1999-1129" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.securityfocus.com/bid/615" }, { "trust": 2.7, "url": "http://www.securityfocus.com/archive/1/26008" }, { "trust": 2.7, "url": "http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm" }, { "trust": 2.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3294" }, { "trust": 0.6, "url": "http://xforce.iss.net/static/3294.php" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/sec_incident_response.shtml" }, { "trust": 0.3, "url": "/archive/1/419831" }, { "trust": 0.3, "url": "/archive/1/419834" } ], "sources": [ { "db": "VULHUB", "id": "VHN-1110" }, { "db": "BID", "id": "615" }, { "db": "CNNVD", "id": "CNNVD-199909-002" }, { "db": "NVD", "id": "CVE-1999-1129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-1110" }, { "db": "BID", "id": "615" }, { "db": "CNNVD", "id": "CNNVD-199909-002" }, { "db": "NVD", "id": "CVE-1999-1129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "1999-09-01T00:00:00", "db": "VULHUB", "id": "VHN-1110" }, { "date": "1999-09-02T00:00:00", "db": "BID", "id": "615" }, { "date": "1999-09-01T00:00:00", "db": "CNNVD", "id": "CNNVD-199909-002" }, { "date": "1999-09-01T04:00:00", "db": "NVD", "id": "CVE-1999-1129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-19T00:00:00", "db": "VULHUB", "id": "VHN-1110" }, { "date": "2009-07-11T00:56:00", "db": "BID", "id": "615" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-199909-002" }, { "date": "2024-11-20T23:30:22.793000", "db": "NVD", "id": "CVE-1999-1129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-199909-002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IEEE 802.1q unauthorized VLAN Traversing weaknesses", "sources": [ { "db": "CNNVD", "id": "CNNVD-199909-002" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "615" }, { "db": "CNNVD", "id": "CNNVD-199909-002" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.