Update CVE-2017-3881.yaml

patch-1
sandeep 2021-03-11 20:54:59 +05:30 committed by Dwi Siswanto
parent 0f3d09b753
commit c3ce5be9c6
1 changed files with 5 additions and 7 deletions

View File

@ -4,13 +4,10 @@ info:
name: Cisco IOS 12.2(55)SE11 Remote Code Execution
author: dwisiswant0
severity: critical
reference: https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
tags: cve,cve2017,cisco,rce
# RCE exploit code is available for Cisco Catalyst 2960 switch model. This exploit is firmware dependent.
# DoS code is available as a Metasploit module¹. This should work for most of the switches mentioned in the Cisco advisory.
# ¹ https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
tags: cve,cve2017,cisco,rce,network
reference: |
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
network:
- inputs:
@ -21,6 +18,7 @@ network:
host:
- "{{Hostname}}:23"
read-size: 1024
matchers:
- type: word
words: