Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2001-08-31 |
Product | Cbos | Last view | 2002-10-04 |
Version | 2.1.0a | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:cbos |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2002-10-04 | CVE-2002-0886 | Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. |
5 | 2001-10-18 | CVE-2001-0754 | Cisco CBOS 2.3.8 and earlier allows remote attackers to cause a denial of service via a series of large ICMP ECHO REPLY (ping) packets, which cause it to enter ROMMON mode and stop forwarding packets. |
7.5 | 2001-10-18 | CVE-2001-0753 | Cisco CBOS 2.3.8 and earlier stores the passwords for (1) exec and (2) enable in cleartext in the NVRAM and a configuration file, which could allow unauthorized users to obtain the passwords and gain privileges. |
5 | 2001-10-18 | CVE-2001-0752 | Cisco CBOS 2.3.8 and earlier allows remote attackers to cause a denial of service via an ICMP ECHO REQUEST (ping) with the IP Record Route option set. |
7.5 | 2001-10-18 | CVE-2001-0751 | Cisco switches and routers running CBOS 2.3.8 and earlier use predictable TCP Initial Sequence Numbers (ISN), which allows remote attackers to spoof or hijack TCP connections. |
5 | 2001-08-31 | CVE-2001-1065 | Web-based configuration utility in Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap binds itself to port 80 even when web-based configuration services are disabled, which could leave the router open to attack. |
5 | 2001-08-31 | CVE-2001-1064 | Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap allows remote attackers to cause a denial of service via multiple connections to the router on the (1) HTTP or (2) telnet service, which causes the router to become unresponsive and stop forwarding packets. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
8861 | Cisco DSL CPE Multiple Service Large Packet DoS |
8828 | Cisco 600 Series Routers Web-based Configuration Utility Persistence |
8824 | Cisco CBOS NVRAM Cleartext Password Storage |
8823 | Cisco 600 Series Routers Multiple Service Connection Flood DoS |
5573 | Cisco CBOS ICMP DoS |
5541 | Cisco CBOS Large Ping Packet ROMMON Mode DoS |
199 | Multiple Vendor TCP/IP ISN Sequence Prediction Weakness |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | record route rr denial of service attempt RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2003-03-03 | Name: It is possible to predict TCP/IP Initial Sequence Numbers for the remote host. File: tcp_seq.nasl - Type: ACT_GATHER_INFO |