Executive Summary
Summary | |
---|---|
Title | Cisco IOS Software Multiple Features IP Sockets Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20090325-ip | First vendor Publication | 2008-12-08 |
Vendor | Cisco | Last vendor Modification | 2009-03-25 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the handling of IP sockets can cause devices to be vulnerable to a denial of service attack when any of several features of Cisco IOS Software are enabled. A sequence of specially crafted TCP/IP packets could cause any of the following results: * The configured feature may stop accepting new connections or sessions. Cisco has released free software updates that address this vulnerability. Several mitigation strategies are outlined in the "Workarounds" section of this advisory. |
Original Source
Url : http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9 (...) |
Alert History
Date | Informations |
---|---|
2016-04-26 21:32:43 |
|
2014-02-17 10:21:55 |
|