CVE-2002-0853
https://notcve.org/view.php?id=CVE-2002-0853
Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. El Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de CPU) mediante un paquete con una carga útil de longitud cero. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml http://www.iss.net/security_center/static/9821.php http://www.kb.cert.org/vuls/id/287771 http://www.securityfocus.com/bid/5440 •
CVE-2002-0852
https://notcve.org/view.php?id=CVE-2002-0852
Buffer overflows in Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service via (1) an Internet Key Exchange (IKE) with a large Security Parameter Index (SPI) payload, or (2) an IKE packet with a large number of valid payloads. Desbordamiento de búfer en Cliente de Red Privada Virtual (VPN) de Cisco 3.5.4 y anteriores permite a atacantes remotos causar una denegación de servicio mediante un Intecambio de Clave de Intenet (Internet Key Exchange - IKE) con un contenido útil (payload) de una Índice de Parámetro de Seguridad (Security Parameter Index - SQI) largo, o un paquete IKE con un número grande de contenidos útiles válidos. • http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml •
CVE-2002-1447 – Cisco VPN Client for Unix 3.5.1 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-1447
Buffer overflow in the vpnclient program for UNIX VPN Client before 3.5.2 allows local users to gain administrative privileges via a long profile name in a connect argument. • https://www.exploit-db.com/exploits/21568 http://online.securityfocus.com/archive/1/277653 http://sec.angrypacket.com/advisories/0002_AP.vpnclient.txt http://www.cisco.com/warp/public/707/cisco-unix-vpnclient-buffer-overflow-pub.shtml http://www.iss.net/security_center/static/9376.php http://www.securityfocus.com/bid/5056 •