CVE-2006-0354 – Cisco Aironet Wireless Access Points - Memory Exhaustion ARP (Denial of Service)
https://notcve.org/view.php?id=CVE-2006-0354
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. • https://www.exploit-db.com/exploits/1447 http://secunia.com/advisories/18430 http://securityreason.com/securityalert/339 http://securitytracker.com/id?1015483 http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml http://www.osvdb.org/22375 http://www.securityfocus.com/bid/16217 http://www.vupen.com/english/advisories/2006/0176 https://exchange.xforce.ibmcloud.com/vulnerabilities/24086 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef% • CWE-399: Resource Management Errors •
CVE-2005-3482
https://notcve.org/view.php?id=CVE-2005-3482
Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. • http://secunia.com/advisories/17406 http://securityreason.com/securityalert/139 http://securitytracker.com/id?1015140 http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml http://www.osvdb.org/20454 http://www.securityfocus.com/bid/15272 http://www.vupen.com/english/advisories/2005/2278 •
CVE-2005-0356 – TCP TIMESTAMPS - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •