CVE-2009-0631
https://notcve.org/view.php?id=CVE-2009-0631
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando se ha configurado con (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, o (4) Media Gateway Control Protocol (MGCP) permite a atacantes remotos provocar una denegación de servicio (bloqueo de entrada a la cola en el interfaz de entrada) mediante un paquete UDP manipulado. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34245 http://www.securitytracker.com/id?1021904 https://exchange.xforce.ibmcloud.com/vulnerabilities/49419 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6720 •
CVE-2009-0636
https://notcve.org/view.php?id=CVE-2009-0636
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when SIP voice services are enabled, allows remote attackers to cause a denial of service (device crash) via a valid SIP message. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando están habilitados los servicios de voz SIP, permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante un mensaje SIP válido. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021902 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c0.shtml http://www.securityfocus.com/bid/34243 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49421 •
CVE-2009-0629
https://notcve.org/view.php?id=CVE-2009-0629
The (1) Airline Product Set (aka ALPS), (2) Serial Tunnel Code (aka STUN), (3) Block Serial Tunnel Code (aka BSTUN), (4) Native Client Interface Architecture (NCIA) support, (5) Data-link switching (aka DLSw), (6) Remote Source-Route Bridging (RSRB), (7) Point to Point Tunneling Protocol (PPTP), (8) X.25 for Record Boundary Preservation (RBP), (9) X.25 over TCP (XOT), and (10) X.25 Routing features in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (device reload) via a series of crafted TCP packets. Las funcionalidades (1) Airline Product Set (conocido como ALPS), (2) Serial Tunnel Code (conocido como STUN), (3) Block Serial Tunnel Code (conocido como BSTUN), (4) soporte para Native Client Interface Architecture (NCIA), (5) Data-link switching (conocido como DLSw), (6) Remote Source-Route Bridging (RSRB), (7) Point to Point Tunneling Protocol (PPTP), (8) X.25 para Record Boundary Preservation (RBP), (9) X.25 sobre TCP (XOT), y (10) X.25 Routing en Cisco IOS v12.2 hasta 12.4 permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021903 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904cb.shtml http://www.securityfocus.com/bid/34238 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49420 •
CVE-2009-0637
https://notcve.org/view.php?id=CVE-2009-0637
The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command. El servidor SCP en Cisco IOS v12.2 hasta la versión v12.4, cuando se ha habilitado el acceso CLI basado en roles, no refuerza la configuración de la visualización CLI para transferencias de ficheros, permitiendo a atacantes remotos autenticados con una vista CLI adjunta (1) leer o (2) sobreescribir ficheros de su elección mediante un comando SCP. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021899 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml http://www.securityfocus.com/bid/34247 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49423 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-0626
https://notcve.org/view.php?id=CVE-2009-0626
The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet. La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegación de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021896 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34239 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49425 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919 • CWE-399: Resource Management Errors •