ID

VAR-E-200501-0112


CVE

cve_id:CVE-2005-0195

Trust: 0.3

sources: BID: 12368

TITLE

Cisco IOS IPv6 Processing Remote Denial Of Service Vulnerability

Trust: 0.3

sources: BID: 12368

DESCRIPTION

A remote denial of service vulnerability affects the IPv6 processing functionality of Cisco IOS. This issue is due to a failure of the affected operating system to properly handle specially crafted network data.
It is possible for an attacker to produce a sustained denial of service condition against an affected device by continually sending the malicious network data.
An attacker may leverage this issue to cause an affected device to reload, denying service to legitimate users.

Trust: 0.3

sources: BID: 12368

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yzscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2szscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0szscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ziscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

sources: BID: 12368

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 12368

PRICE

Free

Trust: 0.3

sources: BID: 12368

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 12368

CREDITS

The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

Trust: 0.3

sources: BID: 12368

EXTERNAL IDS

db:CERT/CCid:VU#472582

Trust: 0.3

db:NVDid:CVE-2005-0195

Trust: 0.3

db:BIDid:12368

Trust: 0.3

sources: BID: 12368

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/472582

Trust: 0.3

sources: BID: 12368

SOURCES

db:BIDid:12368

LAST UPDATE DATE

2022-07-27T09:23:38.348000+00:00


SOURCES UPDATE DATE

db:BIDid:12368date:2009-07-12T10:06:00

SOURCES RELEASE DATE

db:BIDid:12368date:2005-01-26T00:00:00