Executive Summary

Informations
Name CVE-2007-0479 First vendor Publication 2007-01-24
Vendor Cve Last vendor Modification 2017-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0479

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5080
 
Oval ID: oval:org.mitre.oval:def:5080
Title: Cisco IOS IPv4 Memory Leak DoS Vulnerability
Description: Memory leak in the TCP listener in Cisco IOS 9.x, 10.x, 11.x, and 12.x allows remote attackers to cause a denial of service by sending crafted TCP traffic to an IPv4 address on the IOS device.
Family: ios Class: vulnerability
Reference(s): CVE-2007-0479
Version: 1
Platform(s): Cisco IOS
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 253

Open Source Vulnerability Database (OSVDB)

Id Description
32093 Cisco IOS Listener Crafted TCP Packets DoS

Cisco IOS contains a flaw that may allow a remote attacker to cause a denial of service. The issue is due to the TCP listener not properly handling malformed TCP traffic sent to IPv4 addresses. By sending such traffic, an attacker can cause the device to leak memory and eventually exhaust resources causing the device to stop routing traffic.

Nessus® Vulnerability Scanner

Date Description
2010-09-01 Name : This plugin has been deprecated.
File : cisco-sa-20070124-bundle.nasl - Type : ACT_GATHER_INFO
2010-09-01 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20070124-crafted-tcphttp.nasl - Type : ACT_GATHER_INFO
2007-03-01 Name : It is possible to crash the remote device remotely.
File : CSCek37177.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/22208
CERT http://www.us-cert.gov/cas/techalerts/TA07-024A.html
CERT-VN http://www.kb.cert.org/vuls/id/217912
CISCO http://www.cisco.com/en/US/products/products_security_advisory09186a00807cb0e...
OSVDB http://osvdb.org/32093
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1017551
SECUNIA http://secunia.com/advisories/23867
VUPEN http://www.vupen.com/english/advisories/2007/0329
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/31716

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:05:17
  • Multiple Updates
2021-04-22 01:05:52
  • Multiple Updates
2020-05-23 00:19:10
  • Multiple Updates
2017-10-11 09:23:50
  • Multiple Updates
2017-07-29 12:01:58
  • Multiple Updates
2016-06-28 16:07:38
  • Multiple Updates
2016-04-26 15:40:43
  • Multiple Updates
2014-02-17 10:38:50
  • Multiple Updates
2013-05-11 10:18:29
  • Multiple Updates