{"vuid":"VU#463944","idnumber":"463944","name":"Cisco Catalyst reboots in response to an SSH \"protocol mismatch\" error","keywords":["Cisco","Catalyst","SSH","3DES","protocol","mismatch","CSCds85763"],"overview":"Multiple versions of Cisco Catalyst switches contain a denial-of-service vulnerability that allows unauthenticated remote users to restart an affected device.","clean_desc":"Cisco Catalyst switches in the 6000, 5000, and 4000 series contain a vulnerability in their SSH support component. The vulnerability is triggered by attempting to connect to the SSH service using a protocol other than SSH. The attempt generates a \"protocol mismatch\" error and causes the switch to restart, resulting in a denial-of-service condition.","impact":"This vulnerability allows unauthenticated remote users to restart an affected switch, resulting in a denial-of-service condition.","resolution":"In December 2000, Cisco published a Cisco Security Advisory to address this issue. For patch information and a list of affected systems, please see: http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Cisco.","author":"This document was written by Jeffrey P. Lanza.","public":["http://www.securityfocus.com/bid/2117","http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml","http://www.cisco.com/warp/public/707/cisco-sn-20040326-exploits.shtml"],"cveids":["CVE-2001-0080"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-12-21T00:31:17Z","publicdate":"2000-12-20T00:00:00Z","datefirstpublished":"2004-03-29T18:09:35Z","dateupdated":"2004-03-31T14:32:49Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"16","cam_impact":"5","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"21","cam_scorecurrentwidelyknown":"21","cam_scorecurrentwidelyknownexploited":"27","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.0,"vulnote":null}