Cisco

Ios

504 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Zone-Based Firewall (ZFW) feature in Cisco IOS 15.1 through 15.2, when content filtering or HTTP ALG inspection is enabled, allows remote attackers to cause a denial of service (device reload or hang) via crafted IPv4 HTTP traffic, aka Bug ID CSC...

  • EPSS 0.43%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The T1/E1 driver-queue functionality in Cisco IOS 12.2 and 15.0 through 15.3, when an HDLC32 driver is used, allows remote attackers to cause a denial of service (interface queue wedge) via bursty network traffic, aka Bug ID CSCub67465.

  • EPSS 0.43%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cisco IOS 15.0 through 15.3 and IOS XE 3.2 through 3.8, when a VRF interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via crafted UDP RSVP packets, aka Bug ID CSCuf17023.

  • EPSS 0.43%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCtn53730.

  • EPSS 0.43%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCuf28733.

  • EPSS 0.55%
  • Veröffentlicht 27.09.2013 10:08:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The PPTP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via crafted TCP port-1723 packets, aka Bug ID CSCtq14817.

  • EPSS 0.75%
  • Veröffentlicht 30.08.2013 20:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The TCP implementation in Cisco IOS does not properly implement the transitions from the ESTABLISHED state to the CLOSED state, which allows remote attackers to cause a denial of service (flood of ACK packets) via a crafted series of ACK and FIN pack...

  • EPSS 1%
  • Veröffentlicht 05.08.2013 13:22:47
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets b...

  • EPSS 0.2%
  • Veröffentlicht 19.07.2013 14:36:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of the Group Encrypted Transport VPN (GET VPN) feature on Cisco IOS uses an improper mechanism for enabling Group Domain of Interpretation (GDOI) traffic flow, which allows remote attackers to bypass the encryption policy vi...

  • EPSS 0.05%
  • Veröffentlicht 13.05.2013 11:50:48
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The crypto engine process in Cisco IOS on Aggregation Services Router (ASR) Route Processor 2 does not properly manage memory, which allows local users to cause a denial of service (route processor crash) by creating multiple tunnels and then examini...