Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2004-08-06 |
Product | Catos | Last view | 2004-08-06 |
Version | 2.1(8) | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:catos |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2004-08-06 | CVE-2004-0551 | Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack." |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
6829 | Cisco CatOS TCP-ACK Remote DoS |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2004-06-11 | Name: The remote device is missing a vendor-supplied security patch. File: CSCec42751.nasl - Type: ACT_GATHER_INFO |