DOS: Cisco Catalyst SSH Protocol Mismatch DoS

This signature detects attempts to exploit a known vulnerability against a Cisco Catalyst switch. When negotiating an SSH connection with a Cisco Catalyst switch, attackers can use the thong.pl exploit to send an invalid SSH header reply, hanging the service and creating a denial-of-service (DoS) condition.

Extended Description

Software versions 6.1(1), 6.1(1a) and 6.1(1b) for Catalyst 4000, 5000, and 6000 devices that support SSH and 3 DES encryption contain a vulnerability that may allow an attacker to cause a denial of service. If a connection is made to the SSH service on a vulnerable Catalyst device and the protocol mismatch error occurs, the device will be reset.

Affected Products

Cisco catalyst_4000

Short Name
DOS:NETDEV:CATALYST-SSH-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DOS
Keywords
CVE-2001-0080 CVE-2007-6166 Catalyst Cisco DoS Mismatch Protocol SSH bid:2117
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Cisco

CVSS Score

9.3

5.0

Found a potential security threat?