ID
VAR-E-201003-1412
CVE
| cve_id: | CVE-2010-0585 | Trust: 0.3 |
TITLE
Cisco IOS For Communication Manager Express SCCP (CVE-2010-0585) Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS, configured for use on Cisco Communication Manager Express, is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to crash and reload, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCsz48614.
Trust: 0.3
AFFECTED PRODUCTS
| vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xy | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xw | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.4xv | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xm | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xl | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xj | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xe | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xz | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3tpc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2zb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yy | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yw | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xnf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xne | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xnd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xnc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xnb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xna | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2xb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2tpc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2mc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2 zh6 | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.1yi | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.1yf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.1yd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 15.0 m2 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 15.0 m1 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xn | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 yb5 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 mr1 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3 jk1 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3 xa7 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3 yk3 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2sb | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2 yj1 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2 ya8 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2 mc2b | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.2 yv1 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
| db: | NVD | id: | CVE-2010-0585 | Trust: 0.3 |
| db: | BID | id: | 38936 | Trust: 0.3 |
REFERENCES
| url: | http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html | Trust: 0.3 |
| url: | http://www.cisco.com/en/us/products/products_security_advisory09186a0080b20f33.shtml | Trust: 0.3 |
SOURCES
| db: | BID | id: | 38936 |
LAST UPDATE DATE
2022-07-27T09:59:23.291000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 38936 | date: | 2010-03-24T00:00:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 38936 | date: | 2010-03-24T00:00:00 |