Page 4 of 22 results (0.001 seconds)

CVSS: 6.1EPSS: 0%CPEs: 58EXPL: 0

The mDNS snooping functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.4.1.54 and earlier does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) via crafted mDNS packets, aka Bug ID CSCue04153. La funcionalidad mDNS snooping en Cisco Wireless LAN Controller (WLC) los dispositivos con software v7.4.1.54 y anteriores no gestionar adecuadamente buffers, lo que permite a usuarios remotos autenticados causar una denegación de servicio (recarga de dispositivo) a través de paquetes mDNS artesanales, ID de error alias CSCue04153 . • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1141 http://tools.cisco.com/security/center/viewAlert.x?alertId=28417 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 0

Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 3.2 before 3.2.215.0; 4.1 and 4.2 before 4.2.205.0; 4.1M and 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.188.0; and 5.2 before 5.2.193.11 allows remote attackers to cause a denial of service (device reload) via a crafted IKE packet, aka Bug ID CSCta56653. Vulnerabilidad no específica en Cisco Wireless LAN Controller (WLC), v3.2 anterior a v3.2.215.0; v4.1 y v4.2 anteriores a v4.2.205.0; v4.1M y v4.2M anteriores a v4.2.207.54M; v5.0, v5.1, y v6.0 anteriores a v6.0.188.0; y v5.2 anteriores a v5.2.193.11 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de paquetes IKE modificados, también conocido como Bug ID CSCta56653. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21287 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml •

CVSS: 7.1EPSS: 2%CPEs: 10EXPL: 0

Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841. Cisco 4100 y 4400, Airespace 4000, y Catalyst 6500 y 3750 Wireless LAN Controller (WLC) software anterior a 3.2 20070727, 4.0 anterior a 20070727, y 4.1 anterior a 4.1.180.0 permite a atacantes remotos provocar denegación de servicio (amplificación de tráfico o tormenta ARP)a través de una respuesta ARP unicast que (1) tiene una dirección de destino MAC desconocida a la infraestructura Layer-2, también conocida como CSCsj69233; o (2) ocurre a lo lago del roaming Layer-3 a través de subredes IP, también conocido como CSCsj70841. • http://secunia.com/advisories/26161 http://www.cisco.com/en/US/products/products_security_advisory09186a008088ab28.shtml http://www.securityfocus.com/bid/25043 http://www.securitytracker.com/id?1018444 http://www.vupen.com/english/advisories/2007/2636 https://exchange.xforce.ibmcloud.com/vulnerabilities/35576 •

CVSS: 7.1EPSS: 2%CPEs: 10EXPL: 0

Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client context", aka CSCsj50374. Cisco 4100 y 4400, Airespace 4000, y Catalyst 6500 y 3750 Wireless LAN Controller (WLC) software 4.1 versiones anteriores a 4.1.180.0, permiten a atacantes remotos provocar una denegación de servicio (tormenta ARP) mediante un distribución a todos de paquete ARP que "coincide con la dirección IP de un contexto de cliente conocido", también conocido como CSCsj50374. • http://secunia.com/advisories/26161 http://www.cisco.com/en/US/products/products_security_advisory09186a008088ab28.shtml http://www.securityfocus.com/bid/25043 http://www.securitytracker.com/id?1018444 http://www.vupen.com/english/advisories/2007/2636 https://exchange.xforce.ibmcloud.com/vulnerabilities/35576 https://exchange.xforce.ibmcloud.com/vulnerabilities/44591 •

CVSS: 6.1EPSS: 1%CPEs: 3EXPL: 0

The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841. La Network Processing Unit (NPU) en el Cisco Wireless LAN Controller (WLC) anterior a 3.2.171.5, 4.0.x anterior a 4.0.206.0, y 4.1.x permite a atacantes remotos en una red local inalámbrica provocar una denegación de servicio (perdida de reenvío de paquetes) mediante (1) paquetes SNAP manipulados, (2) tráfico 802.11 manipulado, o (3) paquetes con determinados valores de longitud de cabecera, también conocido como Bug IDs CSCsg15901 y CSCsh10841. • http://securitytracker.com/id?1017908 http://www.cisco.com/warp/public/707/cisco-sa-20070412-wlc.shtml http://www.osvdb.org/34137 http://www.osvdb.org/34139 http://www.securityfocus.com/bid/23461 http://www.vupen.com/english/advisories/2007/1368 https://exchange.xforce.ibmcloud.com/vulnerabilities/33609 • CWE-399: Resource Management Errors •