ID

VAR-200110-0029


CVE

CVE-2001-0750


TITLE

Cisco IOS vulnerable to deferred DoS via SYN scan to certain TCP port ranges

Trust: 0.8

sources: CERT/CC: VU#178024

DESCRIPTION

Cisco IOS 12.1(2)T, 12.1(3)T allow remote attackers to cause a denial of service (reload) via a connection to TCP ports 3100-3999, 5100-5999, 7100-7999 and 10100-10999. It is maintained by Cisco systems. By initiating a TCP scan against a piece of Cisco hardware 3100-3999, 5100-5999, 7100-7999, and 10100-10999, the router becomes unstable and suffers memory corruption. Upon the next attempt to access the configuration, the router will unexpectedly reload the configuration. This problem makes it possible for a remote user to cause an arbitrary reload of the router configuration, and potentially deny service to network assets

Trust: 2.7

sources: NVD: CVE-2001-0750 // CERT/CC: VU#178024 // JVNDB: JVNDB-2001-000077 // BID: 2804 // VULHUB: VHN-3558

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.1\(2\)t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1\(3\)t

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:ios 12.1 tscope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(1)

Trust: 0.3

vendor:ciscomodel:ios 12.1 xsscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 dcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 dbscope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#178024 // BID: 2804 // JVNDB: JVNDB-2001-000077 // CNNVD: CNNVD-200110-061 // NVD: CVE-2001-0750

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0750
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#178024
value: 11.81

Trust: 0.8

NVD: CVE-2001-0750
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200110-061
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3558
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0750
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-3558
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#178024 // VULHUB: VHN-3558 // JVNDB: JVNDB-2001-000077 // CNNVD: CNNVD-200110-061 // NVD: CVE-2001-0750

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0750

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200110-061

TYPE

Unknown

Trust: 0.9

sources: BID: 2804 // CNNVD: CNNVD-200110-061

CONFIGURATIONS

sources: JVNDB: JVNDB-2001-000077

PATCH

title:Top Pageurl:http://www.cisco.com/jp/index.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2001-000077

EXTERNAL IDS

db:BIDid:2804

Trust: 3.6

db:NVDid:CVE-2001-0750

Trust: 2.5

db:OSVDBid:800

Trust: 1.7

db:CERT/CCid:VU#178024

Trust: 0.8

db:JVNDBid:JVNDB-2001-000077

Trust: 0.8

db:CNNVDid:CNNVD-200110-061

Trust: 0.7

db:CISCOid:20010524 IOS RELOAD AFTER SCANNING VULNERABILITY

Trust: 0.6

db:XFid:6589

Trust: 0.6

db:VULHUBid:VHN-3558

Trust: 0.1

sources: CERT/CC: VU#178024 // VULHUB: VHN-3558 // BID: 2804 // JVNDB: JVNDB-2001-000077 // CNNVD: CNNVD-200110-061 // NVD: CVE-2001-0750

REFERENCES

url:http://www.securityfocus.com/bid/2804

Trust: 3.3

url:http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml

Trust: 2.8

url:http://www.osvdb.org/800

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6589

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0750

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0750

Trust: 0.8

url:http://xforce.iss.net/static/6589.php

Trust: 0.6

sources: CERT/CC: VU#178024 // VULHUB: VHN-3558 // BID: 2804 // JVNDB: JVNDB-2001-000077 // CNNVD: CNNVD-200110-061 // NVD: CVE-2001-0750

CREDITS

This vulnerability was announced to Bugtraq in a Cisco Security Advisory on May 24, 2001.

Trust: 0.9

sources: BID: 2804 // CNNVD: CNNVD-200110-061

SOURCES

db:CERT/CCid:VU#178024
db:VULHUBid:VHN-3558
db:BIDid:2804
db:JVNDBid:JVNDB-2001-000077
db:CNNVDid:CNNVD-200110-061
db:NVDid:CVE-2001-0750

LAST UPDATE DATE

2025-04-03T22:40:46.171000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#178024date:2001-10-25T00:00:00
db:VULHUBid:VHN-3558date:2017-10-10T00:00:00
db:BIDid:2804date:2001-05-24T00:00:00
db:JVNDBid:JVNDB-2001-000077date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200110-061date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0750date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#178024date:2001-10-25T00:00:00
db:VULHUBid:VHN-3558date:2001-10-18T00:00:00
db:BIDid:2804date:2001-05-24T00:00:00
db:JVNDBid:JVNDB-2001-000077date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200110-061date:2001-10-18T00:00:00
db:NVDid:CVE-2001-0750date:2001-10-18T04:00:00