Page 16 of 144 results (0.055 seconds)

CVSS: 6.8EPSS: 0%CPEs: 288EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776. Cisco IOS v12.0 hasta la v12.4, cuando están activados los túneles basados en IP y la utilidad "Cisco Express Forwarding", permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través de paquetes malformados que no son apropiadamente tratados durante el cambio de un túnel a un segundo túnel, también conocido como Bug IDs CSCsh97579 y CSCsq31776. • http://osvdb.org/58333 http://tools.cisco.com/security/center/viewAlert.x?alertId=18893 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.1EPSS: 2%CPEs: 304EXPL: 0

Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via malformed packets, aka Bug ID CSCsx70889. Cisco IOS v12.0 hasta 12.4, cuando está habilitada la funcionalidad de túnel basado en IP y el Cisco Express Forwarding, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) mediante paquetes deformados, también conocido como Bug ID CSCsx70889. • http://osvdb.org/58334 http://tools.cisco.com/security/center/viewAlert.x?alertId=18895 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html http://www.securitytracker.com/id?1022930 http://www.vupen.com/english/advisories/2009/2759 •

CVSS: 7.1EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1, v12.2XNC anterior a v12.2(33)XNC2, v12.2XND anterior a v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria o reinicio del dispositivo) usando un par RFC4271 para enviar una actualización con una serie larga de números AS, también conocido como fallo ID CSCsy86021. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35862 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697 • CWE-399: Resource Management Errors •

CVSS: 5.4EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1 hasta v12.2(33)SXI2, v12.2XNC hasta v12.2(33)XNC2, v12.2XND hasta v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remoto causar una denegación de servicio (recarga del dispositivo) usando un par RFC4271 para enviar una actualización malformado, también conocido como Bud ID CSCta33973. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35860 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853 • CWE-16: Configuration •

CVSS: 7.1EPSS: 2%CPEs: 310EXPL: 0

The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets. Las funcionalidades (1) Cisco Unified Communications Manager Express; (2) el soporte de Transport Layer Security (TLS) para SIP Gateway Signaling; (3) Secure Signaling y Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect para EAPoUDP, Dot1x, y la integración de autenticación MAC; (7) Distributed Director con HTTP Redirects; y (8) TCP DNS en Cisco IOS v12.0 hasta 12.4 no maneja adecuadamente los "sockets", permitiendo a atacantes remotos provocar una denegación de servicio (apagado o consumo de recursos) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021897 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml http://www.securityfocus.com/bid/34242 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49418 •