Page 53 of 395 results (0.017 seconds)

CVSS: 7.1EPSS: 2%CPEs: 2049EXPL: 0

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. La implementación del protocolo TCP en (1) Linux, (2) plataformas basadas en BSD Unix, (3) Microsoft Windows, (4) productos Cisco, y probablemente otros sistemas operativos, permite a atacantes remotos provocar una denegación de servicio (agotamiento de cola de conexión) a través de múltiples vectores que manipulan información en la tabla de estados del TCP, como lo demuestra sockstress. • http://blog.robertlee.name/2008/10/conjecture-speculation.html http://insecure.org/stf/tcp-dos-attack-explained.html http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html http://marc.info/?l=bugtraq&m=125856010926699&w=2 http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html http://www.cpni • CWE-16: Configuration •

CVSS: 9.3EPSS: 0%CPEs: 5EXPL: 0

Cisco IOS 12.2 and 12.3 on Cisco uBR10012 series devices, when linecard redundancy is configured, enables a read/write SNMP service with "private" as the community, which allows remote attackers to obtain administrative access by guessing this community and sending SNMP requests. El Cisco IOS v12.2 y v12.3 en los dispositivos de la serie de Cisco uBR10012, cuando se configura la redundancia del linecard, permite un servicio de lectura/escritura del SNMP con "private" como la comunidad, que permite que los atacantes remotos consigan el acceso administrativo obteniendo esta comunidad y enviando peticiones del SNMP. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014b1.shtml http://www.securitytracker.com/id?1020941 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5452 •

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

Cisco IOS 12.0 through 12.4 on Cisco 10000, uBR10012 and uBR7200 series devices handles external UDP packets that are sent to 127.0.0.0/8 addresses intended for IPC communication within the device, which allows remote attackers to cause a denial of service (device or linecard reload) via crafted UDP packets, a different vulnerability than CVE-2008-3805. En Cisco IOS v12.0 a la v12.4 en Cisco 10000, los paquetes externos del UDP del manejador de dispositivos de la serie uBR10012 y uBR7200 que se envían a las direcciones 127.0.0.0 /8 pensados para comunicación IPC dentro del dispositivo, permite que los atacantes remotos causen una denegación del servicio (reinicio del dispositivo o del linecard) a través de paquetes del UDP manipulados, una vulnerabilidad distinta de CVE-2008-3805. • http://secunia.com/advisories/31990 http://tools.cisco.com/security/center/viewAlert.x?alertId=16646 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ae.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/45592 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7123 •

CVSS: 7.1EPSS: 0%CPEs: 85EXPL: 0

Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4, when VoIP is configured, allows remote attackers to cause a denial of service (device reload) via unspecified valid SIP messages, aka Cisco bug ID CSCsk42759, a different vulnerability than CVE-2008-3800 and CVE-2008-3801. Vulnerabilidad sin especificar en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12.4, cuando está configurada la VoIP, permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de mensajes SIP válidos no especificados. También conocida como "bug CSCsk42759". Vulnerabilidad distinta de CVE-2008-3800 y CVE-2008-3801. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml http://www.securitytracker.com/id?1020939 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5889 •

CVSS: 5.1EPSS: 1%CPEs: 3EXPL: 0

A "logic error" in Cisco IOS 12.0 through 12.4, when a Multiprotocol Label Switching (MPLS) VPN with extended communities is configured, sometimes causes a corrupted route target (RT) to be used, which allows remote attackers to read traffic from other VPNs in opportunistic circumstances. Un "error lógico" en Cisco IOS v12.0 a la v12.4, cuando está configurado un Multiprotocol Label Switching (MPLS) VPN "extendida a comunidades" (extended communities), en ocasiones provoca que sea usado un destino de ruta corrupta, lo que permite a atacantes remotos leer el tráfico de red desde otras VPN's en determinadas circunstancias. • http://secunia.com/advisories/31990 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014a9.shtml http://www.securityfocus.com/bid/31366 http://www.securitytracker.com/id?1020940 http://www.vupen.com/english/advisories/2008/2670 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5919 •