ID
VAR-E-201003-1556
CVE
| cve_id: | CVE-2010-0581 | Trust: 0.3 |
TITLE
Cisco IOS SIP Message (CVE-2010-0581) Remote Code Execution Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a remote code-execution service vulnerability.
The attacker can exploit this issue to execute arbitrary code with elevated privileges on affected devices. Successful exploits will completely compromise an affected device.
This issue is tracked by Cisco Bug ID CSCsz89904.
Trust: 0.3
AFFECTED PRODUCTS
| vendor: | cisco | model: | ios 12.4 t3 | scope: | ne | version: | - | Trust: 0.6 |
| vendor: | cisco | model: | ios 12.4yg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4ye | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xr | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4sw | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4md | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4gc | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 15.0m | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 15.0 m1 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4xn | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 mr | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 ye | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 t2 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 md | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 ye2 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 yb5 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 xr3 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.4 mda2 | scope: | ne | version: | - | Trust: 0.3 |
| vendor: | cisco | model: | ios 12.3 yk3 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
The vendor reports that exploits for this issue are available.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
| db: | NVD | id: | CVE-2010-0581 | Trust: 0.3 |
| db: | BID | id: | 38933 | Trust: 0.3 |
REFERENCES
| url: | http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html | Trust: 0.3 |
| url: | http://www.cisco.com/en/us/products/products_security_advisory09186a0080b20f32.shtml#12_4 | Trust: 0.3 |
SOURCES
| db: | BID | id: | 38933 |
LAST UPDATE DATE
2022-07-27T09:28:08.993000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 38933 | date: | 2010-03-30T16:52:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 38933 | date: | 2010-03-24T00:00:00 |