CVE-2013-1146 – Cisco IOS Smart Install Configuration File Upload Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2013-1146
The Smart Install client functionality in Cisco IOS 12.2 and 15.0 through 15.3 on Catalyst switches allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in Smart Install packets, aka Bug ID CSCub55790. La funcionalidad Smart Install del cliente de Cisco IOS v12.2 y v15.0 hasta v15.3 en los switches Catalyst permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de una lista de parámetros imagen en los paquetes de Smart Install, conocido como ID de error alias CSCub55790. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco IOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Smart Install client. A specially crafted packet can be sent to the SMI IBC server to instruct it to download the IOS config file and IOS image file(s). • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-3950
https://notcve.org/view.php?id=CVE-2012-3950
The Intrusion Prevention System (IPS) feature in Cisco IOS 12.3 through 12.4 and 15.0 through 15.2, in certain configurations of enabled categories and missing signatures, allows remote attackers to cause a denial of service (device reload) via DNS packets, aka Bug ID CSCtw55976. La función Intrusion Prevention System (IPS) en Cisco IOS v12.3 hasta la v12.4 y v15.0 hasta la v15.2, en ciertas configuraciones de categorías disponibles y ausencia de firmas, permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de paquetes DNS, también conocido como Bug ID CSCtw55976. • http://secunia.com/advisories/50777 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips http://www.securityfocus.com/bid/55695 http://www.securitytracker.com/id?1027580 https://exchange.xforce.ibmcloud.com/vulnerabilities/78882 • CWE-399: Resource Management Errors •
CVE-2012-4618
https://notcve.org/view.php?id=CVE-2012-4618
The SIP ALG feature in the NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtn76183. La función SIP ALG en la implementación de NAT en Cisco IOS v12.2, v12.4, y v15.0 hasta la v15.2 permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través del tránsito de paquetes IP, también conocido como Bug ID CSCtn76183. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat http://www.securityfocus.com/bid/55693 http://www.securitytracker.com/id?1027579 • CWE-399: Resource Management Errors •
CVE-2012-4620
https://notcve.org/view.php?id=CVE-2012-4620
Cisco IOS 12.2 and 15.0 through 15.2 on Cisco 10000 series routers, when a tunnel interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via tunneled (1) GRE/IP, (2) IPIP, or (3) IPv6 in IPv4 packets, aka Bug ID CSCts66808. Cisco IOS v12.2 y v15.0 hasta la v15.2 en router de la serie Cisco 10000, cuando hay un interfase de tunel, permite a atacantes remotos provocar una denegación de servicio (troceado de la cola del interfase) a través de una tunelización de paquetes (1) GRE/IP, (2) IPIP, o (3) IPv6 en IPv4, también conocido como Bug ID CSCts66808. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-c10k-tunnels http://www.securityfocus.com/bid/55696 http://www.securitytracker.com/id?1027578 https://exchange.xforce.ibmcloud.com/vulnerabilities/78883 • CWE-399: Resource Management Errors •
CVE-2012-4619
https://notcve.org/view.php?id=CVE-2012-4619
The NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtr46123. La implementación de NAT en Cisco IOS v12.2, v12.4, y v15.0 hasta v15.2 permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través del tránsito de paquetes IP, también conocido como Bug ID CSCtr46123. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat http://www.securityfocus.com/bid/55705 http://www.securitytracker.com/id?1027579 • CWE-399: Resource Management Errors •