Page 27 of 280 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 25EXPL: 0

The RSVP protocol implementation in Cisco IOS 12.2 and 15.0 through 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S, when MPLS-TE is enabled, allows remote attackers to cause a denial of service (incorrect memory access and device reload) via a traffic engineering PATH message in an RSVP packet, aka Bug ID CSCtg39957. La implementación del protocolo RSVP en Cisco IOS 12.2 y 15.0 a la 15.2 e IOS XE 3.1.xS a la 3.4.xS anteior a 3.4.5S y 3.5.xS a la 3.7.xS anterior a 3.7.2S, cuando está activado MPLS-TE, permite a atacantes remotos provocar una denegación de servicio (acceso incorrecto a memoria y recarga de dispositivo) a través de un mensaje del tipo "traffic engineering PATH" en un paquete RSVP. Aka Bug ID CSCtg39957. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-rsvp http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1143 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Memory leak in Cisco IOS 12.2, 12.4, 15.0, and 15.1, when Zone-Based Policy Firewall SIP application layer gateway inspection is enabled, allows remote attackers to cause a denial of service (memory consumption or device reload) via malformed SIP messages, aka Bug ID CSCtl99174. Fuga de memoria en Cisco IOS 12.2, 12.4, 15.0 y 15.1, cuando está activada la capa de aplicación de puerta de enlace de inspección, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria o reinicio de dispositivo) a través de mensajes SIP mal formados. Aka Bug ID CSCtl99174. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 1%CPEs: 6EXPL: 0

The Smart Install client functionality in Cisco IOS 12.2 and 15.0 through 15.3 on Catalyst switches allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in Smart Install packets, aka Bug ID CSCub55790. La funcionalidad Smart Install del cliente de Cisco IOS v12.2 y v15.0 hasta v15.3 en los switches Catalyst permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de una lista de parámetros imagen en los paquetes de Smart Install, conocido como ID de error alias CSCub55790. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco IOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Smart Install client. A specially crafted packet can be sent to the SMI IBC server to instruct it to download the IOS config file and IOS image file(s). • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

The NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtr46123. La implementación de NAT en Cisco IOS v12.2, v12.4, y v15.0 hasta v15.2 permite a atacantes remotos provocar una denegación de servicio (recarga del dispositivo) a través del tránsito de paquetes IP, también conocido como Bug ID CSCtr46123. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat http://www.securityfocus.com/bid/55705 http://www.securitytracker.com/id?1027579 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Cisco IOS 12.2 and 15.0 through 15.2 on Cisco 10000 series routers, when a tunnel interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via tunneled (1) GRE/IP, (2) IPIP, or (3) IPv6 in IPv4 packets, aka Bug ID CSCts66808. Cisco IOS v12.2 y v15.0 hasta la v15.2 en router de la serie Cisco 10000, cuando hay un interfase de tunel, permite a atacantes remotos provocar una denegación de servicio (troceado de la cola del interfase) a través de una tunelización de paquetes (1) GRE/IP, (2) IPIP, o (3) IPv6 en IPv4, también conocido como Bug ID CSCts66808. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-c10k-tunnels http://www.securityfocus.com/bid/55696 http://www.securitytracker.com/id?1027578 https://exchange.xforce.ibmcloud.com/vulnerabilities/78883 • CWE-399: Resource Management Errors •