CVE-2005-4258
https://notcve.org/view.php?id=CVE-2005-4258
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Conmutadores Cisco Catalyst no especificados permiten a atacantes remotos causar una denegación de servicio (caída de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuestión es desconocida; los detalles son obtenidos exclusivamente de BID. • http://www.securityfocus.com/bid/15864 https://exchange.xforce.ibmcloud.com/vulnerabilities/44543 •
CVE-2004-0551
https://notcve.org/view.php?id=CVE-2004-0551
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack." Cisco CatOS anteriores a 5.5(20) a 8.x anteriores a 8.2(2) y 8.3(3) GLX, usados en conmutadores Catalyst, permiten a atacantes remotos causar una denegación de servicio (caída del sistema y reinicio) enviando paquétes no válidos en lugar de la porción final ACK del apretón de manos (handshake) en tres pasos a los servicios (1) Telnet, (2) HTTP, o (3) SSH. También conocida como aka "ataque de DoS TCP-ACK ". • http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml http://www.kb.cert.org/vuls/id/245190 https://exchange.xforce.ibmcloud.com/vulnerabilities/16370 •
CVE-2001-0895
https://notcve.org/view.php?id=CVE-2001-0895
Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table. • http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml http://www.kb.cert.org/vuls/id/399355 http://www.osvdb.org/807 http://www.securityfocus.com/bid/3547 https://exchange.xforce.ibmcloud.com/vulnerabilities/7547 •
CVE-2001-0080 – Cisco Catalyst 4000/5000/6000 6.1 - SSH Protocol Mismatch Denial of Service
https://notcve.org/view.php?id=CVE-2001-0080
Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of service by connecting to the SSH service with a non-SSH client, which generates a protocol mismatch error. • https://www.exploit-db.com/exploits/20509 http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml http://www.securityfocus.com/bid/2117 https://exchange.xforce.ibmcloud.com/vulnerabilities/5760 •