Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2007-01-24 |
Product | Ios Transmission Control Protocol | Last view | 2007-05-22 |
Version | Type | Hardware | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2007-05-22 | CVE-2007-2813 | Cisco IOS 12.4 and earlier, when using the crypto packages and SSL support is enabled, allows remote attackers to cause a denial of service via a malformed (1) ClientHello, (2) ChangeCipherSpec, or (3) Finished message during an SSL session. |
7.8 | 2007-01-24 | CVE-2007-0481 | Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header. |
10 | 2007-01-24 | CVE-2007-0480 | Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet. |
7.8 | 2007-01-24 | CVE-2007-0479 | Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:5857 | Cisco IOS IPv6 Type 0 Routing Header DoS Vulnerability |
oval:org.mitre.oval:def:5666 | Cisco IOS IP Option Remote Code Execution Vulnerability |
oval:org.mitre.oval:def:5080 | Cisco IOS IPv4 Memory Leak DoS Vulnerability |
oval:org.mitre.oval:def:5745 | Cisco IOS SSL ChamgeCipherSpec DoS Vulnerability, ClientHello DoS Vulnerabili... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
35339 | Cisco IOS Malformed SSL Messages DoS |
32093 | Cisco IOS Listener Crafted TCP Packets DoS |
32092 | Cisco IOS Crafted IP Options Remote Code Execution |
32091 | Cisco IOS Crafted IPv6 Type 0 Routing Header DoS |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2013-12-14 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20070124-crafted-ip-option-iosxr.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20070124-IOS-IPv6http.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: This plugin has been deprecated. File: cisco-sa-20070124-bundle.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20070124-crafted-ip-optionhttp.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20070124-crafted-tcphttp.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20070522-SSLhttp.nasl - Type: ACT_GATHER_INFO |
2007-03-01 | Name: Arbitrary code can be executed on the remote CISCO device. File: CSCeh52410.nasl - Type: ACT_GATHER_INFO |
2007-03-01 | Name: It is possible to crash the remote device remotely. File: CSCek37177.nasl - Type: ACT_GATHER_INFO |