6 results (0.006 seconds)

CVSS: 7.1EPSS: 0%CPEs: 23EXPL: 0

Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509. Cisco IOS en puntos de acceso Aironet, cuando la depuración está habilitada en 'dot11 aaa authenticator', permite a atacantes remotos a causar una denegación de servicio a través de un paquete EAP mal-formado, también conocido como Bug ID CSCul15509. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998 http://www.securitytracker.com/id/1031219 https://exchange.xforce.ibmcloud.com/vulnerabilities/98692 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 23EXPL: 0

The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281. La implementación DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovación de concesión sin éxito, lo que permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante la activación de una transición a un estado de recuperación con la intención de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, también conocido como Bug ID CSCtn16281. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997 http://www.securitytracker.com/id/1031218 https://exchange.xforce.ibmcloud.com/vulnerabilities/98691 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 322EXPL: 0

Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. Cisco IOS v12.3 y v12.4 en puntos de acceso Aironet permite a atacantes remotos provocar una denegación de servicio (radio-interface input-queue hang) a través de IAPP 0x3281 paquetes, también conocido como Bug ID CSCtc12426. • http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html •

CVSS: 5.5EPSS: 1%CPEs: 8EXPL: 2

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. • https://www.exploit-db.com/exploits/1447 http://secunia.com/advisories/18430 http://securityreason.com/securityalert/339 http://securitytracker.com/id?1015483 http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml http://www.osvdb.org/22375 http://www.securityfocus.com/bid/16217 http://www.vupen.com/english/advisories/2006/0176 https://exchange.xforce.ibmcloud.com/vulnerabilities/24086 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef% • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •