CVE-2007-4292
 
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple memory leaks in Cisco IOS 12.0 through 12.4 allow remote attackers to cause a denial of service (device crash) via a malformed SIP packet, aka (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007, and (7) CSCsc60249.
Múltiples fugas de memoria en el Cisco IOS 12.0 hasta el 12.4 permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través de un paquete SIP mal formado también conocido como (1) CSCsf11855, (2) CSCeb21064, (3) CSCse40276, (4) CSCse68355, (5) CSCsf30058, (6) CSCsb24007 y (7) CSCsc60249.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-08-09 CVE Reserved
- 2007-08-09 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://osvdb.org/36670 | Vdb Entry | |
http://osvdb.org/36671 | Vdb Entry | |
http://osvdb.org/36672 | Vdb Entry | |
http://osvdb.org/36673 | Vdb Entry | |
http://osvdb.org/36674 | Vdb Entry | |
http://osvdb.org/36675 | Vdb Entry | |
http://osvdb.org/36676 | Vdb Entry | |
http://securitytracker.com/id?1018533 | Vdb Entry | |
http://www.securityfocus.com/bid/25239 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/2816 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35890 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5781 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/26363 | 2017-09-29 | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080899653.shtml | 2017-09-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.0 Search vendor "Cisco" for product "Ios" and version "12.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.1 Search vendor "Cisco" for product "Ios" and version "12.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2 Search vendor "Cisco" for product "Ios" and version "12.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.3 Search vendor "Cisco" for product "Ios" and version "12.3" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.4 Search vendor "Cisco" for product "Ios" and version "12.4" | - |
Affected
|