Arista Networks Networks CloudVision Portal IP fragment DoS (SA0037)

high Nessus Plugin ID 138338

Synopsis

The version of Arista Networks CloudVision Portal running on the remote device is affected by a denial of service vulnerability.

Description

The version of Arista Networks CloudVision Portal running on the remote device is affected by a denial of service (DoS) vulnerability. The Linux kernel is vulnerable to a DoS attack with low rates of specially modified packets targeting IP fragment re-assembly. An remote, unauthenticated attacker can cause a DoS condition by sending specially crafted IP fragments. This vulnerability is caused by the increase of the IP fragment reassembly queue size in the Linux kernel.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. To retrieve patch level information this plugin requires the HTTP credentials of the web console.

Solution

Upgrade to a fixed version or apply the mitigation as referenced in the vendor advisory.

See Also

http://www.nessus.org/u?5c910c33

Plugin Details

Severity: High

ID: 138338

File Name: arista_cvp_sa0037.nasl

Version: 1.2

Type: remote

Family: Misc.

Published: 7/9/2020

Updated: 7/10/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-5391

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:arista:cloudvision_portal

Required KB Items: installed_sw/Arista CloudVision Portal

Exploit Ease: No known exploits are available

Patch Publication Date: 8/14/2018

Vulnerability Publication Date: 8/14/2018

Reference Information

CVE: CVE-2018-5391