Page 20 of 180 results (0.008 seconds)

CVSS: 7.1EPSS: 0%CPEs: 136EXPL: 0

Race condition in the Firewall Authentication Proxy feature in Cisco IOS 12.0 through 12.4 allows remote attackers to bypass authentication, or bypass the consent web page, via a crafted request, aka Bug ID CSCsy15227. Una condición de carrera en la función Firewall Authentication Proxy de Cisco IOS v12.0 hasta la v12.4 permite a atacantes remotos evitar la autenticación, o saltarse la página web de la autorización, a través de una solicitud debidamente modificada. Se trata del Bug ID CSCsy15227. • http://osvdb.org/58340 http://tools.cisco.com/security/center/viewAlert.x?alertId=18882 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8132.shtml http://www.securityfocus.com/bid/36491 http://www.securitytracker.com/id?1022935 https://exchange.xforce.ibmcloud.com/vulnerabilities/53453 • CWE-287: Improper Authentication •

CVSS: 7.1EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1, v12.2XNC anterior a v12.2(33)XNC2, v12.2XND anterior a v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria o reinicio del dispositivo) usando un par RFC4271 para enviar una actualización con una serie larga de números AS, también conocido como fallo ID CSCsy86021. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35862 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697 • CWE-399: Resource Management Errors •

CVSS: 5.4EPSS: 1%CPEs: 15EXPL: 0

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1 hasta v12.2(33)SXI2, v12.2XNC hasta v12.2(33)XNC2, v12.2XND hasta v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remoto causar una denegación de servicio (recarga del dispositivo) usando un par RFC4271 para enviar una actualización malformado, también conocido como Bud ID CSCta33973. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35860 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853 • CWE-16: Configuration •

CVSS: 7.1EPSS: 2%CPEs: 310EXPL: 0

The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets. Las funcionalidades (1) Cisco Unified Communications Manager Express; (2) el soporte de Transport Layer Security (TLS) para SIP Gateway Signaling; (3) Secure Signaling y Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect para EAPoUDP, Dot1x, y la integración de autenticación MAC; (7) Distributed Director con HTTP Redirects; y (8) TCP DNS en Cisco IOS v12.0 hasta 12.4 no maneja adecuadamente los "sockets", permitiendo a atacantes remotos provocar una denegación de servicio (apagado o consumo de recursos) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021897 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml http://www.securityfocus.com/bid/34242 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49418 •

CVSS: 7.8EPSS: 2%CPEs: 310EXPL: 0

Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando se ha configurado con (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, o (4) Media Gateway Control Protocol (MGCP) permite a atacantes remotos provocar una denegación de servicio (bloqueo de entrada a la cola en el interfaz de entrada) mediante un paquete UDP manipulado. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34245 http://www.securitytracker.com/id?1021904 https://exchange.xforce.ibmcloud.com/vulnerabilities/49419 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6720 •