ID

VAR-200505-1154


CVE

CVE-2005-0195


TITLE

Cisco IOS vulnerable to DoS via malformed BGP packet

Trust: 0.8

sources: CERT/CC: VU#689326

DESCRIPTION

Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet. A denial-of-service vulnerability exists in Cisco's Internetwork Operating System (IOS). This vulnerability may allow attackers to conduct denial-of-service attacks on an affected device. Cisco IOS In IPv6 Physical and logical interfaces due to improper handling of packets (6to4 Tunnel ) At IPv6 If you have enabled multiple invalid IPv6 A vulnerability exists in which a device is restarted by interpreting a packet.System disrupted service operation (DoS) May be in a state. This issue is due to a failure of the affected operating system to properly handle specially crafted network data. It is possible for an attacker to produce a sustained denial of service condition against an affected device by continually sending the malicious network data. An attacker may leverage this issue to cause an affected device to reload, denying service to legitimate users. Cisco IOS is the operating system that runs on many Cisco devices. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Technical Cyber Security Alert TA05-026A Multiple Denial-of-Service Vulnerabilities in Cisco IOS Original release date: January 26, 2005 Last revised: -- Source: US-CERT Systems Affected * Cisco routers and switches running IOS in various configurations Overview Several denial-of-service vulnerabilities have been discovered in Cisco's Internet Operating System (IOS). I. Further details are available in the following vulnerability notes: VU#583638 - Cisco IOS contains DoS vulnerability in MPLS packet processing The IOS implementation of Multi Protocol Label Switching (MPLS) contains a vulnerability that allows malformed MPLS packets to cause an affected device to reload. An unauthenticated attacker can send these malformed packets on a local network segment that is connected to a vulnerable device interface. The vulnerability is exposed on both physical interfaces (i.e., hardware interfaces), and logical interfaces (i.e., software defined interfaces such as tunnels) that are configured for IPv6. VU#689326 - Cisco IOS vulnerable to DoS via malformed BGP packet An IOS device that is enabled for Border Gateway Protocol (BGP) and set up with the bgp log-neighbor-changes option is vulnerable to a denial-of-service attack via a malformed BGP packet. II. Repeated exploitation of these vulnerabilites would result in a sustained denial-of-service condition. Since devices running IOS may transit traffic for a number of other networks, the secondary impacts of a denial of service may be severe. III. Solution Upgrade to a fixed version of IOS Cisco has updated versions of its IOS software to address these vulnerabilities. Please refer to the "Software Versions and Fixes" sections of the Cisco Security Advisories listed in Appendix A for more information on upgrading. Workaround Cisco has also published practical workarounds for VU#689326 and VU#583638. Please refer to the "Workarounds" section of each Cisco Security Advisory listed in Appendix A for more information. Sites that are unable to install an upgraded version of IOS are encouraged to implement these workarounds. Appendix A. References * Cisco Security Advisory: Crafted Packet Causes Reload on Cisco Routers - <http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml> * Cisco Security Advisory: Multiple Crafted IPv6 Packets Cause Reload - <http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml> * Cisco Security Advisory: Cisco IOS Malformed BGP Packet Causes Reload - <http://www.cisco.com/warp/public/707/cisco-sa-20050126-bgp.shtml> * US-CERT Vulnerability Note VU#583638 - <http://www.kb.cert.org/vuls/id/583638> * US-CERT Vulnerability Note VU#472582 - <http://www.kb.cert.org/vuls/id/472582> * US-CERT Vulnerability Note VU#689326 - <http://www.kb.cert.org/vuls/id/689326> _________________________________________________________________ Feedback can be directed to the authors: Will Dormann, Chad Dougherty, and Damon Morda _________________________________________________________________ This document is available from: <http://www.us-cert.gov/cas/techalerts/TA05-026A.html> _________________________________________________________________ Copyright 2005 Carnegie Mellon University. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History January 26, 2005: Initial release Last updated January 26, 2005 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQfgfthhoSezw4YfQAQJQKAf8DxKPd+9aXGsomYzRhFPyCcnjEfy6dv/N 3GcqV8GR5WyshB207vhvw1PDfZdQVFIXiNr/xE9dmBKEhm38En3a70DnVe2UCmXO UobYXGk9tSW+pnR7Cdd3hc8yeZq0ys+LFKF/sztgpPJji/zFWojPnuS1wCcYggA1 kuGCQ9VD6My64Hlh/PStCYqx5C9azgGHNv086W6fQyCssgjwBz51YxdV9gZ9wJUt I8LGjq6T0Fp+5kEEd9SPoUjA+r7bNft3xUPAabb+N4dt8sZUYqzXDP71lYYXgZay z2FE7jkbtX/LYVQCiA4LfgGCbw1sI6p+UQABtj74CPte2CyJZO5hJw== =aHIO -----END PGP SIGNATURE-----

Trust: 4.32

sources: NVD: CVE-2005-0195 // CERT/CC: VU#689326 // CERT/CC: VU#583638 // CERT/CC: VU#472582 // JVNDB: JVNDB-2005-000062 // BID: 12368 // VULHUB: VHN-11404 // VULMON: CVE-2005-0195 // PACKETSTORM: 35919

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 2.7

vendor:ciscomodel: - scope: - version: -

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:12.3xa

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3bc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3j

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3bw

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xb

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2zd

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.3ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ze

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2jk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ewa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2su

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zo

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2se

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ew

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0szscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2szscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ziscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

sources: CERT/CC: VU#689326 // CERT/CC: VU#583638 // CERT/CC: VU#472582 // BID: 12368 // JVNDB: JVNDB-2005-000062 // NVD: CVE-2005-0195 // CNNVD: CNNVD-200505-217

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-0195
value: MEDIUM

Trust: 1.8

CARNEGIE MELLON: VU#689326
value: 12.13

Trust: 0.8

CARNEGIE MELLON: VU#583638
value: 21.24

Trust: 0.8

CARNEGIE MELLON: VU#472582
value: 10.61

Trust: 0.8

CNNVD: CNNVD-200505-217
value: MEDIUM

Trust: 0.6

VULHUB: VHN-11404
value: MEDIUM

Trust: 0.1

VULMON: CVE-2005-0195
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2005-0195
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

VULHUB: VHN-11404
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#689326 // CERT/CC: VU#583638 // CERT/CC: VU#472582 // VULHUB: VHN-11404 // VULMON: CVE-2005-0195 // JVNDB: JVNDB-2005-000062 // NVD: CVE-2005-0195 // CNNVD: CNNVD-200505-217

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0195

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 35919 // CNNVD: CNNVD-200505-217

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200505-217

CONFIGURATIONS

sources: NVD: CVE-2005-0195

PATCH

title:cisco-sa-20050126-ipv6url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml

Trust: 0.8

title:cisco-sa-20050126-ipv6url:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20050126-ipv6-j.shtml

Trust: 0.8

title:Cisco: Multiple Crafted IPv6 Packets Cause Reloadurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20050126-ipv6

Trust: 0.1

sources: VULMON: CVE-2005-0195 // JVNDB: JVNDB-2005-000062

EXTERNAL IDS

db:CERT/CCid:VU#472582

Trust: 3.8

db:NVDid:CVE-2005-0195

Trust: 2.9

db:USCERTid:TA05-026A

Trust: 2.7

db:BIDid:12368

Trust: 1.2

db:CERT/CCid:VU#689326

Trust: 0.9

db:CERT/CCid:VU#583638

Trust: 0.9

db:SECUNIAid:14032

Trust: 0.8

db:JVNDBid:JVNDB-2005-000062

Trust: 0.8

db:CNNVDid:CNNVD-200505-217

Trust: 0.7

db:XFid:19072

Trust: 0.6

db:XFid:6

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5813

Trust: 0.6

db:CERT/CCid:TA05-026A

Trust: 0.6

db:CISCOid:20050126 MULTIPLE CRAFTED IPV6 PACKETS CAUSE RELOAD

Trust: 0.6

db:VULHUBid:VHN-11404

Trust: 0.1

db:VULMONid:CVE-2005-0195

Trust: 0.1

db:PACKETSTORMid:35919

Trust: 0.1

sources: CERT/CC: VU#689326 // CERT/CC: VU#583638 // CERT/CC: VU#472582 // VULHUB: VHN-11404 // VULMON: CVE-2005-0195 // BID: 12368 // JVNDB: JVNDB-2005-000062 // PACKETSTORM: 35919 // NVD: CVE-2005-0195 // CNNVD: CNNVD-200505-217

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/472582

Trust: 2.9

url:http://www.us-cert.gov/cas/techalerts/ta05-026a.html

Trust: 2.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5813

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/19072

Trust: 1.2

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml

Trust: 0.8

url:http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm#xtocid5

Trust: 0.8

url:http://www.cisco.com/warp/public/732/tech/mpls

Trust: 0.8

url:http://www.cisco.com/pcgi-bin/support/bugtool/onebug.pl?bugid=csced40933

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0195

Trust: 0.8

url:http://jvn.jp/cert/jvnta05-026a

Trust: 0.8

url:http://jvn.jp/tr/trta05-026a

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0195

Trust: 0.8

url:http://secunia.com/advisories/14032/

Trust: 0.8

url:http://www.securityfocus.com/bid/12368

Trust: 0.8

url:http://xforce.iss.net/xforce/alerts/id/185

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/19072

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5813

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=8700

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/583638>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-les.shtml>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/472582>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/689326>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta05-026a.html>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20050126-bgp.shtml>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

sources: CERT/CC: VU#689326 // CERT/CC: VU#583638 // CERT/CC: VU#472582 // VULHUB: VHN-11404 // VULMON: CVE-2005-0195 // BID: 12368 // JVNDB: JVNDB-2005-000062 // PACKETSTORM: 35919 // NVD: CVE-2005-0195 // CNNVD: CNNVD-200505-217

CREDITS

Cisco Security AdvisoryThis advisory is available at

Trust: 0.6

sources: CNNVD: CNNVD-200505-217

SOURCES

db:CERT/CCid:VU#689326
db:CERT/CCid:VU#583638
db:CERT/CCid:VU#472582
db:VULHUBid:VHN-11404
db:VULMONid:CVE-2005-0195
db:BIDid:12368
db:JVNDBid:JVNDB-2005-000062
db:PACKETSTORMid:35919
db:NVDid:CVE-2005-0195
db:CNNVDid:CNNVD-200505-217

LAST UPDATE DATE

2023-12-18T10:52:39.199000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#689326date:2005-01-26T00:00:00
db:CERT/CCid:VU#583638date:2005-01-26T00:00:00
db:CERT/CCid:VU#472582date:2005-02-01T00:00:00
db:VULHUBid:VHN-11404date:2017-10-11T00:00:00
db:VULMONid:CVE-2005-0195date:2017-10-11T00:00:00
db:BIDid:12368date:2009-07-12T10:06:00
db:JVNDBid:JVNDB-2005-000062date:2007-04-01T00:00:00
db:NVDid:CVE-2005-0195date:2017-10-11T01:29:53.090
db:CNNVDid:CNNVD-200505-217date:2009-03-04T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#689326date:2005-01-26T00:00:00
db:CERT/CCid:VU#583638date:2005-01-26T00:00:00
db:CERT/CCid:VU#472582date:2005-01-26T00:00:00
db:VULHUBid:VHN-11404date:2005-05-02T00:00:00
db:VULMONid:CVE-2005-0195date:2005-05-02T00:00:00
db:BIDid:12368date:2005-01-26T00:00:00
db:JVNDBid:JVNDB-2005-000062date:2007-04-01T00:00:00
db:PACKETSTORMid:35919date:2005-01-27T04:44:58
db:NVDid:CVE-2005-0195date:2005-05-02T04:00:00
db:CNNVDid:CNNVD-200505-217date:2005-01-26T00:00:00