
CVE-2008-3799
https://notcve.org/view.php?id=CVE-2008-3799
26 Sep 2008 — Memory leak in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4, when VoIP is configured, allows remote attackers to cause a denial of service (memory consumption and voice-service outage) via unspecified valid SIP messages. Fuga de memoria en la implementación de la Session Initiation Protocol (SIP) en Cisco IOS v12.2 a la v12.4, cuando VoIP está configurada, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y parada del servicio de voz) ... • http://secunia.com/advisories/31990 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2008-3800
https://notcve.org/view.php?id=CVE-2008-3800
26 Sep 2008 — Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4 and Unified Communications Manager 4.1 through 6.1, when VoIP is configured, allows remote attackers to cause a denial of service (device or process reload) via unspecified valid SIP messages, aka Cisco Bug ID CSCsu38644, a different vulnerability than CVE-2008-3801 and CVE-2008-3802. Vulnerabilidad no especificada en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12... • http://secunia.com/advisories/31990 •

CVE-2008-3801
https://notcve.org/view.php?id=CVE-2008-3801
26 Sep 2008 — Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4 and Unified Communications Manager 4.1 through 6.1, when VoIP is configured, allows remote attackers to cause a denial of service (device or process reload) via unspecified valid SIP messages, aka Cisco Bug ID CSCsm46064, a different vulnerability than CVE-2008-3800 and CVE-2008-3802. Vulnerabilidad no especificada en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12... • http://secunia.com/advisories/31990 •

CVE-2008-3802
https://notcve.org/view.php?id=CVE-2008-3802
26 Sep 2008 — Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4, when VoIP is configured, allows remote attackers to cause a denial of service (device reload) via unspecified valid SIP messages, aka Cisco bug ID CSCsk42759, a different vulnerability than CVE-2008-3800 and CVE-2008-3801. Vulnerabilidad sin especificar en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12.4, cuando está configurada la VoIP, permite a atacantes remot... • http://secunia.com/advisories/31990 •

CVE-2008-3803
https://notcve.org/view.php?id=CVE-2008-3803
26 Sep 2008 — A "logic error" in Cisco IOS 12.0 through 12.4, when a Multiprotocol Label Switching (MPLS) VPN with extended communities is configured, sometimes causes a corrupted route target (RT) to be used, which allows remote attackers to read traffic from other VPNs in opportunistic circumstances. Un "error lógico" en Cisco IOS v12.0 a la v12.4, cuando está configurado un Multiprotocol Label Switching (MPLS) VPN "extendida a comunidades" (extended communities), en ocasiones provoca que sea usado un destino de ruta c... • http://secunia.com/advisories/31990 •

CVE-2008-3804
https://notcve.org/view.php?id=CVE-2008-3804
26 Sep 2008 — Unspecified vulnerability in the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (memory corruption) via crafted packets for which the software path is used. Vulnerabilidad sin especificar en el Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) en Cisco IOS v12.2 y v12.4, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) a través de paquetes manipula... • http://secunia.com/advisories/31990 •

CVE-2008-3805
https://notcve.org/view.php?id=CVE-2008-3805
26 Sep 2008 — Cisco IOS 12.0 through 12.4 on Cisco 10000, uBR10012 and uBR7200 series devices handles external UDP packets that are sent to 127.0.0.0/8 addresses intended for IPC communication within the device, which allows remote attackers to cause a denial of service (device or linecard reload) via crafted UDP packets, a different vulnerability than CVE-2008-3806. Cisco IOS v12.0 a la v12.4 sobre Cisco 10000, uBR10012 y uBR7200 maneja los paquetes externos UDP que son enviados a las direcciones 127.0.0.0/8 intencionad... • http://secunia.com/advisories/31990 •

CVE-2008-3806
https://notcve.org/view.php?id=CVE-2008-3806
26 Sep 2008 — Cisco IOS 12.0 through 12.4 on Cisco 10000, uBR10012 and uBR7200 series devices handles external UDP packets that are sent to 127.0.0.0/8 addresses intended for IPC communication within the device, which allows remote attackers to cause a denial of service (device or linecard reload) via crafted UDP packets, a different vulnerability than CVE-2008-3805. En Cisco IOS v12.0 a la v12.4 en Cisco 10000, los paquetes externos del UDP del manejador de dispositivos de la serie uBR10012 y uBR7200 que se envían a las... • http://secunia.com/advisories/31990 •

CVE-2008-3807
https://notcve.org/view.php?id=CVE-2008-3807
26 Sep 2008 — Cisco IOS 12.2 and 12.3 on Cisco uBR10012 series devices, when linecard redundancy is configured, enables a read/write SNMP service with "private" as the community, which allows remote attackers to obtain administrative access by guessing this community and sending SNMP requests. El Cisco IOS v12.2 y v12.3 en los dispositivos de la serie de Cisco uBR10012, cuando se configura la redundancia del linecard, permite un servicio de lectura/escritura del SNMP con "private" como la comunidad, que permite que los a... • http://secunia.com/advisories/31990 •

CVE-2008-3808
https://notcve.org/view.php?id=CVE-2008-3808
26 Sep 2008 — Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device reload) via a crafted Protocol Independent Multicast (PIM) packet. Vulnerabilidad no especificada en Cisco IOS v12.0, permite a atacantes remotos causar denegación de servicio (reinicio de dispositivo) a través del paquete del Protocolo Multidifusión Independiente (PIM) manipulado. • http://secunia.com/advisories/31990 •