First published: Thu Sep 14 2006(Updated: )
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.1\(19\) | |
Cisco CatOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4775 is classified as a high severity vulnerability due to its potential to cause denial of service.
CVE-2006-4775 allows remote attackers to disrupt service by exploiting the VLAN Trunking Protocol feature.
The exploitation of CVE-2006-4775 can lead to a complete denial of service, impacting network availability.
To mitigate CVE-2006-4775, it is recommended to upgrade to a patched version of Cisco IOS or CatOS that addresses the vulnerability.
CVE-2006-4775 affects Cisco IOS version 12.1(19) and specific versions of Cisco CatOS that utilize VLAN Trunking Protocol.