Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2004-08-06 |
Product | Catalyst 2902 | Last view | 2005-12-15 |
Version | * | Type | Hardware |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:h:cisco:catalyst_2902 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2005-12-15 | CVE-2005-4258 | Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. |
5 | 2004-08-06 | CVE-2004-0551 | Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack." |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
6829 | Cisco CatOS TCP-ACK Remote DoS |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2004-06-11 | Name: The remote device is missing a vendor-supplied security patch. File: CSCec42751.nasl - Type: ACT_GATHER_INFO |