How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
The VTP protocol implementation in Cisco IOS is potentially
vulnerable to a denial of service attack via a specially crafted VTP
packet sent from the local network segment when operating in either
server or client VTP mode. When the device receives the specially
crafted VTP packet, the switch may crash. The crafted packet must be
received on a switch interface configured to operate as a trunk
See also :
Apply the relevant patch which can be obtained from the Cisco Bug
Risk factor :
Medium / CVSS Base Score : 5.7
CVSS Temporal Score : 4.7
Public Exploit Available : true
Nessus Plugin ID: 17792 ()
Bugtraq ID: 32120
CVE ID: CVE-2008-4963
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.