CVE-2009-0636
https://notcve.org/view.php?id=CVE-2009-0636
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when SIP voice services are enabled, allows remote attackers to cause a denial of service (device crash) via a valid SIP message. Vulnerabilidad no especificada en Cisco IOS v12.0 hasta v12.4, cuando están habilitados los servicios de voz SIP, permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante un mensaje SIP válido. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021902 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c0.shtml http://www.securityfocus.com/bid/34243 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49421 •
CVE-2009-0629
https://notcve.org/view.php?id=CVE-2009-0629
The (1) Airline Product Set (aka ALPS), (2) Serial Tunnel Code (aka STUN), (3) Block Serial Tunnel Code (aka BSTUN), (4) Native Client Interface Architecture (NCIA) support, (5) Data-link switching (aka DLSw), (6) Remote Source-Route Bridging (RSRB), (7) Point to Point Tunneling Protocol (PPTP), (8) X.25 for Record Boundary Preservation (RBP), (9) X.25 over TCP (XOT), and (10) X.25 Routing features in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (device reload) via a series of crafted TCP packets. Las funcionalidades (1) Airline Product Set (conocido como ALPS), (2) Serial Tunnel Code (conocido como STUN), (3) Block Serial Tunnel Code (conocido como BSTUN), (4) soporte para Native Client Interface Architecture (NCIA), (5) Data-link switching (conocido como DLSw), (6) Remote Source-Route Bridging (RSRB), (7) Point to Point Tunneling Protocol (PPTP), (8) X.25 para Record Boundary Preservation (RBP), (9) X.25 sobre TCP (XOT), y (10) X.25 Routing en Cisco IOS v12.2 hasta 12.4 permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021903 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904cb.shtml http://www.securityfocus.com/bid/34238 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49420 •
CVE-2009-0637
https://notcve.org/view.php?id=CVE-2009-0637
The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command. El servidor SCP en Cisco IOS v12.2 hasta la versión v12.4, cuando se ha habilitado el acceso CLI basado en roles, no refuerza la configuración de la visualización CLI para transferencias de ficheros, permitiendo a atacantes remotos autenticados con una vista CLI adjunta (1) leer o (2) sobreescribir ficheros de su elección mediante un comando SCP. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021899 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml http://www.securityfocus.com/bid/34247 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49423 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-0626
https://notcve.org/view.php?id=CVE-2009-0626
The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet. La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegación de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021896 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34239 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49425 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919 • CWE-399: Resource Management Errors •
CVE-2009-0635
https://notcve.org/view.php?id=CVE-2009-0635
Memory leak in the Cisco Tunneling Control Protocol (cTCP) encapsulation feature in Cisco IOS 12.4, when an Easy VPN (aka EZVPN) server is enabled, allows remote attackers to cause a denial of service (memory consumption and device crash) via a sequence of TCP packets. Perdida de memoria en la funcionalidad de encapsulado de Cisco Tunneling Control Protocol (cTCP) en Cisco IOS v12.4, cuando se ha habilitado un servidor Easy VPN (conocido como EZVPN), permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y caída del dispositivo) mediante una secuencia de paquetes TCP. • http://secunia.com/advisories/34438 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90459.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.securityfocus.com/bid/34246 http://www.securitytracker.com/id?1021895 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49417 • CWE-399: Resource Management Errors •