ID

VAR-E-200305-0058


TITLE

Cisco IOS Service Assurance Agent Malformed Packet Denial Of Service Vulnerability

Trust: 0.3

sources: BID: 7607

DESCRIPTION

It has been reported that Cisco IOS is vulnerable to an issue in handling Service Assurance Agent (previously called Response Time Reporter, or RTR) packets. Because of this, a remote user may be able to cause the router to become unstable and crash.

Trust: 0.3

sources: BID: 7607

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 1.2

vendor:ciscomodel:ios 12.1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.0 stscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 dascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(7)

Trust: 0.3

vendor:ciscomodel:ios 12.2 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1(11)

Trust: 0.3

vendor:ciscomodel:ios 12.1 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0spscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sxscope: - version: -

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:800

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7300

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7200

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7100

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7010

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7000

Trust: 0.3

vendor:ciscomodel:nspscope:eqversion:6400

Trust: 0.3

vendor:ciscomodel:nrpscope:eqversion:6400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:6400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:6200

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3800

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:12000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:10700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1005

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1000

Trust: 0.3

sources: BID: 7607

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 7607

PRICE

Free

Trust: 0.3

sources: BID: 7607

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 7607

CREDITS

This vulnerability was reported by the vendor.

Trust: 0.3

sources: BID: 7607

EXTERNAL IDS

db:BIDid:7607

Trust: 0.3

sources: BID: 7607

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml

Trust: 0.3

sources: BID: 7607

SOURCES

db:BIDid:7607

LAST UPDATE DATE

2022-07-27T09:58:01.485000+00:00


SOURCES UPDATE DATE

db:BIDid:7607date:2003-05-15T00:00:00

SOURCES RELEASE DATE

db:BIDid:7607date:2003-05-15T00:00:00