This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2007-01-24
Product Ios Transmission Control Protocol Last view 2007-05-22
Version Type Hardware
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bw:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ez:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xe:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xl:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bc:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xv:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ay:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ea:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eb:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ey:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2by:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xf:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xg:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0t:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ye:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xl:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xi:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sy:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cy:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cz:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ex:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2see:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sb:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2s:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xh:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yf:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sv:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xj:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wc:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2b:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fz:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xq:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xr:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1cx:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ec:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sw:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1t:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixa:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xh:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xi:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xt:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xu:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yb:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yc:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yd:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xc:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dd:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sef:*:*:*:*:*:*:* 4
cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fx:*:*:*:*:*:*:* 4

Related : CVE

  Date Alert Description
7.8 2007-05-22 CVE-2007-2813

Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session.

7.8 2007-01-24 CVE-2007-0481

Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header.

10 2007-01-24 CVE-2007-0480

Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet.

7.8 2007-01-24 CVE-2007-0479

Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device.

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:5857 Cisco IOS IPv6 Type 0 Routing Header DoS Vulnerability
oval:org.mitre.oval:def:5666 Cisco IOS IP Option Remote Code Execution Vulnerability
oval:org.mitre.oval:def:5080 Cisco IOS IPv4 Memory Leak DoS Vulnerability
oval:org.mitre.oval:def:5745 Cisco IOS SSL ChamgeCipherSpec DoS Vulnerability, ClientHello DoS Vulnerabili...

Open Source Vulnerability Database (OSVDB)

id Description
35339 Cisco IOS Malformed SSL Messages DoS
32093 Cisco IOS Listener Crafted TCP Packets DoS
32092 Cisco IOS Crafted IP Options Remote Code Execution
32091 Cisco IOS Crafted IPv6 Type 0 Routing Header DoS

Nessus® Vulnerability Scanner

id Description
2013-12-14 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20070124-crafted-ip-option-iosxr.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20070124-IOS-IPv6http.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: This plugin has been deprecated.
File: cisco-sa-20070124-bundle.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20070124-crafted-ip-optionhttp.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20070124-crafted-tcphttp.nasl - Type: ACT_GATHER_INFO
2010-09-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20070522-SSLhttp.nasl - Type: ACT_GATHER_INFO
2007-03-01 Name: Arbitrary code can be executed on the remote CISCO device.
File: CSCeh52410.nasl - Type: ACT_GATHER_INFO
2007-03-01 Name: It is possible to crash the remote device remotely.
File: CSCek37177.nasl - Type: ACT_GATHER_INFO