Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-4440

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2005-4440
Last Modified 05 Sep 2008 04:56:53
Published 20 Dec 2005 09:03:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-4440

Summary

The 802.1q VLAN protocol allows remote attackers to bypass network segmentation and spoof VLAN traffic via a message with two 802.1q tags, which causes the second tag to be redirected from a downstream switch after the first tag has been stripped, as demonstrated by Yersinia, aka "double-tagging VLAN jumping attack."

Vulnerable Systems

Application

  • Vlan Protocol 802.1q


References

BUGTRAQ - 20051219 Re: Making unidirectional VLAN and PVLAN jumping bidirectional

BUGTRAQ - 20051219 Making unidirectional VLAN and PVLAN jumping bidirectional


Last Updated: 27 May 2016 10:41:18