ID

VAR-E-200404-0128


CVE

cve_id:CVE-2004-0714

Trust: 0.3

sources: BID: 10186

TITLE

Cisco Internet Operating System SNMP Message Processing Denial Of Service Vulnerability

Trust: 0.3

sources: BID: 10186

DESCRIPTION

It has been reported that the Cisco Internet Operating System (IOS) is affected by a remote SNMP message processing denial of service vulnerability. This is caused by a design error that causes memory corruption in the affected system under certain circumstances.
This issue may be leveraged to cause a denial of service condition in the affected device. The denial of service is due to a corruption of memory in the affected device. As a result, there may be other consequences, such as code execution. This has not been confirmed by Cisco.

Trust: 0.3

sources: BID: 10186

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2scope:neversion: -

Trust: 0.9

vendor:ciscomodel:ios 12.3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s6scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(6)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(5)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(23)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(21)

Trust: 0.3

vendor:ciscomodel:ios 12.2 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1euscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ew1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ec1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sv1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(9)

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(7.7)

Trust: 0.3

vendor:ciscomodel:ios 12.3 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xqscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xkscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xhscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 eo1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(24)

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(23.6)

Trust: 0.3

vendor:ciscomodel:ios 12.2 swscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ebscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ew2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eo1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ec2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sv2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s2scope:neversion: -

Trust: 0.3

sources: BID: 10186

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 10186

PRICE

Free

Trust: 0.3

sources: BID: 10186

TYPE

Design Error

Trust: 0.3

sources: BID: 10186

CREDITS

This issue was disclosed in the referenced vendor advisory.

Trust: 0.3

sources: BID: 10186

EXTERNAL IDS

db:USCERTid:TA04-111B

Trust: 0.3

db:NVDid:CVE-2004-0714

Trust: 0.3

db:BIDid:10186

Trust: 0.3

sources: BID: 10186

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta04-111b.html

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml

Trust: 0.3

sources: BID: 10186

SOURCES

db:BIDid:10186

LAST UPDATE DATE

2022-07-27T09:26:29.357000+00:00


SOURCES UPDATE DATE

db:BIDid:10186date:2015-03-19T08:23:00

SOURCES RELEASE DATE

db:BIDid:10186date:2004-04-20T00:00:00