Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2002-12-31 |
Product | Pix Firewall Software | Last view | 2008-01-23 |
Version | 5.2(3) | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:pix_firewall_software |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.1 | 2008-01-23 | CVE-2008-0028 | Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet. |
5 | 2002-12-31 | CVE-2002-2140 | Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60070 | Cisco PIX Firewall Multiple Method HTTP Authentication Remote DoS |
40640 | Cisco PIX / ASA Crafted IP Packet Time-To-Live DoS |