Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2004-08-06 |
Product | Catalyst 4912g | Last view | 2005-12-15 |
Version | Type | Hardware | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:* | 2 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2005-12-15 | CVE-2005-4258 | Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. |
5 | 2004-08-06 | CVE-2004-0551 | Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack." |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
6829 | Cisco CatOS TCP-ACK Remote DoS |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2004-06-11 | Name: The remote device is missing a vendor-supplied security patch. File: CSCec42751.nasl - Type: ACT_GATHER_INFO |