ID
VAR-E-200404-0128
CVE
cve_id: | CVE-2004-0714 | Trust: 0.3 |
TITLE
Cisco Internet Operating System SNMP Message Processing Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
It has been reported that the Cisco Internet Operating System (IOS) is affected by a remote SNMP message processing denial of service vulnerability. This is caused by a design error that causes memory corruption in the affected system under certain circumstances.
This issue may be leveraged to cause a denial of service condition in the affected device. The denial of service is due to a corruption of memory in the affected device. As a result, there may be other consequences, such as code execution. This has not been confirmed by Cisco.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.2 | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2 | scope: | ne | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.3 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.3 t3 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0 s5 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0 s4 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.3 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0 s6 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ons 15454e optical transport platform | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.1(3) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.1(2) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.1(1) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.1(0) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.1 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.0(2) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.0(1) | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154544.0 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154543.4 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154543.3 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154543.2.0 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154543.1.0 | Trust: 0.3 |
vendor: | cisco | model: | ons optical transport platform | scope: | eq | version: | 154543.0 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3(6) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3(5) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xd1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xc2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xc1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2(23) | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2(21) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 s1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1eu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1eo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ec | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1eb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ea | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ew1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 eo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ec1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ec | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ea1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 sv1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 s1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.3(9) | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.3(7.7) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 b1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xq | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xk | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xh | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xg1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xd2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 eo1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xc3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.2(24) | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.2(23.6) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sw | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 s | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 s2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 eb | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ew2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 eo1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ec2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ea1a | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 sv2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 s1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 s2 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
This issue was disclosed in the referenced vendor advisory.
Trust: 0.3
EXTERNAL IDS
db: | USCERT | id: | TA04-111B | Trust: 0.3 |
db: | NVD | id: | CVE-2004-0714 | Trust: 0.3 |
db: | BID | id: | 10186 | Trust: 0.3 |
REFERENCES
url: | http://www.us-cert.gov/cas/techalerts/ta04-111b.html | Trust: 0.3 |
url: | http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 10186 |
LAST UPDATE DATE
2022-07-27T09:26:29.357000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 10186 | date: | 2015-03-19T08:23:00 |
SOURCES RELEASE DATE
db: | BID | id: | 10186 | date: | 2004-04-20T00:00:00 |