Executive Summary

Informations
Name CVE-2005-2451 First vendor Publication 2005-08-03
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2451

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5445
 
Oval ID: oval:org.mitre.oval:def:5445
Title: Cisco Systems Internetwork Operating System IPv6 Packet DoS, Code Execution Vulnerability
Description: Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet.
Family: ios Class: vulnerability
Reference(s): CVE-2005-2451
Version: 1
Platform(s): Cisco IOS
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 146
Os 2

Open Source Vulnerability Database (OSVDB)

Id Description
18332 Cisco IOS Crafted IPv6 Packet Remote Code Execution

Cisco IOS contains a flaw that may allow a malicious user to cause denial of service conditions or execute arbitrary code. The issue is triggered when a crafted IPv6 packet is sent to a router running a vulnerable version of IPv6 code. It is possible that the flaw may allow a denial of service or the execution of arbitrary code, resulting in a loss of integrity, and/or availability.

Nessus® Vulnerability Scanner

Date Description
2010-09-01 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20050729-ipv6.nasl - Type : ACT_GATHER_INFO
2005-09-22 Name : The remote router contains a vulnerability which may allow an attacker to exe...
File : CSCef68324.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html
http://secunia.com/advisories/16272
http://securitytracker.com/id?1014598
http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml
http://www.kb.cert.org/vuls/id/930892
http://www.osvdb.org/18332
http://www.securityfocus.com/bid/14414
http://www.us-cert.gov/cas/techalerts/TA05-210A.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/21591
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 23:22:00
  • Multiple Updates
2024-11-28 12:07:17
  • Multiple Updates
2021-05-04 12:03:05
  • Multiple Updates
2021-04-22 01:03:22
  • Multiple Updates
2020-05-23 00:16:44
  • Multiple Updates
2017-10-11 09:23:33
  • Multiple Updates
2017-07-11 12:01:58
  • Multiple Updates
2016-06-28 15:20:28
  • Multiple Updates
2016-04-26 13:42:28
  • Multiple Updates
2014-02-17 10:32:17
  • Multiple Updates
2013-05-11 11:29:31
  • Multiple Updates