Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-0479 | First vendor Publication | 2007-01-24 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0479 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5080 | |||
Oval ID: | oval:org.mitre.oval:def:5080 | ||
Title: | Cisco IOS IPv4 Memory Leak DoS Vulnerability | ||
Description: | Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device. | ||
Family: | ios | Class: | vulnerability |
Reference(s): | CVE-2007-0479 | Version: | 1 |
Platform(s): | Cisco IOS | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
32093 | Cisco IOS Listener Crafted TCP Packets DoS Cisco IOS contains a flaw that may allow a remote attacker to cause a denial of service. The issue is due to the TCP listener not properly handling malformed TCP traffic sent to IPv4 addresses. By sending such traffic, an attacker can cause the device to leak memory and eventually exhaust resources causing the device to stop routing traffic. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-01 | Name : This plugin has been deprecated. File : cisco-sa-20070124-bundle.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20070124-crafted-tcphttp.nasl - Type : ACT_GATHER_INFO |
2007-03-01 | Name : It is possible to crash the remote device remotely. File : CSCek37177.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:18:23 |
|
2024-11-28 12:11:23 |
|
2021-05-04 12:05:17 |
|
2021-04-22 01:05:52 |
|
2020-05-23 00:19:10 |
|
2017-10-11 09:23:50 |
|
2017-07-29 12:01:58 |
|
2016-06-28 16:07:38 |
|
2016-04-26 15:40:43 |
|
2014-02-17 10:38:50 |
|
2013-05-11 10:18:29 |
|