ID

VAR-200508-0320


CVE

CVE-2005-2451


TITLE

Cisco IOS vulnerable to DoS or arbitrary code execution via specially crafted IPv6 packet

Trust: 0.8

sources: CERT/CC: VU#930892

DESCRIPTION

Cisco IOS 12.0 through 12.4 and IOS XR before 3.2, with IPv6 enabled, allows remote attackers on a local network segment to cause a denial of service (device reload) and possibly execute arbitrary code via a crafted IPv6 packet. A successful attack may allow the attacker to execute arbitrary code and gain unauthorized access to the device. The attacker can also leverage this issue to cause an affected device to reload, denying service to legitimate users. Cisco has stated that exploits of this vulnerability in Cisco IOS XR may cause the IPv6 neighbor discovery process to restart. If exploited repeatedly, this could result in a prolonged denial of service affecting IPv6 traffic traveling through the device. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA05-210A Cisco IOS IPv6 Vulnerability Original release date: July 29, 2005 Last revised: -- Source: US-CERT Systems Affected * Cisco IOS devices with IPv6 enabled For specific information, please see the Cisco Advisory. I. US-CERT has not confirmed further technical details. According to the Cisco Advisory, this vulnerability could be exploited by an attacker on the same IP subnet: Crafted packets from the local segment received on logical interfaces (that is, tunnels including 6to4 tunnels) as well as physical interfaces can trigger this vulnerability. Crafted packets can not traverse a 6to4 tunnel and attack a box across the tunnel. The crafted packet must be sent from a local network segment to trigger the attack. This vulnerability can not be exploited one or more hops from the IOS device. US-CERT strongly recommends that sites running Cisco IOS devices review the Cisco Advisory and upgrade as appropriate. We are tracking this vulnerability as VU#930892. II. The attacker may be able to take control of a vulnerable device. III. Solutions Upgrade Upgrade to a fixed version of IOS. Please see the Software Versions and Fixes section of the Cisco Advisory for details. On a router which supports IPv6, this must be done by issuing the command "no ipv6 enable" and "no ipv6 address" on each interface. Appendix A. Vendor Information Cisco Systems, Inc. Cisco Systems, Inc. has released a security advisory regarding a vulnerability which was disclosed on July 27, 2005 at the Black Hat security conference. Security advisory is available at: http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml For up-to-date information on security vulnerabilities in Cisco Systems, Inc. products, visit http://www.cisco.com/go/psirt. Appendix B. References * US-CERT Vulnerability Note VU#930892 - <http://www.kb.cert.org/vuls/id/930892> * Cisco Security Advisory: IPv6 Crafted Packet Vulnerability - <http://www.cisco.com/en/US/products/products_security_advisory091 86a00804d82c9.shtml> _________________________________________________________________ Information regarding this vulnerability was primarily provided by Cisco Systems, who in turn acknowledge the disclosure of this vulnerability at the Black Hat USA 2005 Briefings. _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Send mail to <cert@cert.org> with "TA05-210A feedback VU#930892" in the subject. _________________________________________________________________ The most recent version of this document is available at: <http://www.us-cert.gov/cas/techalerts/TA05-210A.html> _________________________________________________________________ Produced 2005 by US-CERT, a government organization. _________________________________________________________________ Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History July 29, 2005: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQuqgLRhoSezw4YfQAQI5iwgAkSYXPNt6Hffg7BfMeYoBaZ4Co6XFVjQ6 nWHKt1inYcYta/DXEuWJAhcjI/t8v74OH0b5sxGEr0mwtzEwV2r5pAF6nQesqyoj q3r60OE3TZygxUZPrGNmmkSpkhoNap9cSVs97Xt6Fd4evOmp0VZ6pqMdJtQ/r5xk d67LicCM9NLNoC0LPoen2/7ICu7jqxZnoF4oHDkZS8b2g2mx7vfz3Htj44Nd5/eD tWe8HqF8ReSyLEiOj8z8vrjcfz+BIwSLXnyr6DDxSvFmhy0CunGFkCQq074CwbVE GZjAJSn2r/A2Pp3HBP/RxQ9BNv8rHrSF7DkG9gADc5PV8WpaLCHP0Q== =4jtB -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Cisco IOS IPv6 Packet Handling Vulnerability SECUNIA ADVISORY ID: SA16272 VERIFY ADVISORY: http://secunia.com/advisories/16272/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/product/50/ Cisco IOS 12.x http://secunia.com/product/182/ DESCRIPTION: A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. SOLUTION: The vendor has issued updated versions (see patch matrix in vendor advisory). Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2005-2451 // CERT/CC: VU#930892 // JVNDB: JVNDB-2005-000460 // BID: 14414 // VULHUB: VHN-13660 // PACKETSTORM: 39015 // PACKETSTORM: 38953

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.3scope:neversion: -

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.2xf

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xb

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2yc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2yb

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xa

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xh

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xg

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xe

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2xd

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.1.0

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.3

vendor:ciscomodel:ios xrscope:eqversion:3.0.1

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.1yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2eu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2za

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ze

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2jk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sec

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ez

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ew

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2by

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2dx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yo

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2so

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ewa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0st

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2su

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zo

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3bw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2dd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2seb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bz

Trust: 1.0

vendor:ciscomodel:ios 12.2 sv1scope:neversion: -

Trust: 0.9

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:ios 12.2 zd3scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 t16scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mrscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xq1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2seascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sv2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ez1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2szscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxd4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2euscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ywscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sec1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ezscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2soscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jkscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ya10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t9scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ewa2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xrscope:neversion:3.2

Trust: 0.3

vendor:ciscomodel:ios 12.3 ysscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 seb3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 svscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ytscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(15)

Trust: 0.3

vendor:ciscomodel:ios 12.2 sw3ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mc2cscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ya1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yjscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2secscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bc2hscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s9scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sv3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxb8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxe1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xe3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s14scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yuscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.4(1)

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 eu1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ew2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ewa1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 jk4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mb13bscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sescope: - version: -

Trust: 0.3

sources: CERT/CC: VU#930892 // BID: 14414 // JVNDB: JVNDB-2005-000460 // NVD: CVE-2005-2451 // CNNVD: CNNVD-200508-039

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-2451
value: LOW

Trust: 1.8

CARNEGIE MELLON: VU#930892
value: 25.64

Trust: 0.8

CNNVD: CNNVD-200508-039
value: LOW

Trust: 0.6

VULHUB: VHN-13660
value: LOW

Trust: 0.1

NVD:
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2005-2451
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-13660
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#930892 // VULHUB: VHN-13660 // JVNDB: JVNDB-2005-000460 // NVD: CVE-2005-2451 // CNNVD: CNNVD-200508-039

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2451

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200508-039

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 14414 // CNNVD: CNNVD-200508-039

CONFIGURATIONS

sources: NVD: CVE-2005-2451

PATCH

title:cisco-sa-20050729-ipv6url:http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml

Trust: 0.8

title:cisco-sa-20050729-ipv6url:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20050729-ipv6-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2005-000460

EXTERNAL IDS

db:SECUNIAid:16272

Trust: 3.4

db:CERT/CCid:VU#930892

Trust: 3.4

db:NVDid:CVE-2005-2451

Trust: 2.8

db:BIDid:14414

Trust: 2.8

db:USCERTid:TA05-210A

Trust: 2.6

db:SECTRACKid:1014598

Trust: 2.5

db:OSVDBid:18332

Trust: 1.7

db:JVNDBid:JVNDB-2005-000460

Trust: 0.8

db:CNNVDid:CNNVD-200508-039

Trust: 0.7

db:CISCOid:20050729 IPV6 CRAFTED PACKET VULNERABILITY

Trust: 0.6

db:XFid:21591

Trust: 0.6

db:XFid:6

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5445

Trust: 0.6

db:FULLDISCid:20050729 CISCO IOS SHELLCODE PRESENTATION

Trust: 0.6

db:CERT/CCid:TA05-210A

Trust: 0.6

db:VULHUBid:VHN-13660

Trust: 0.1

db:PACKETSTORMid:39015

Trust: 0.1

db:PACKETSTORMid:38953

Trust: 0.1

sources: CERT/CC: VU#930892 // VULHUB: VHN-13660 // BID: 14414 // JVNDB: JVNDB-2005-000460 // PACKETSTORM: 39015 // PACKETSTORM: 38953 // NVD: CVE-2005-2451 // CNNVD: CNNVD-200508-039

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml

Trust: 2.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0663.html

Trust: 2.5

url:http://www.securityfocus.com/bid/14414

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta05-210a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/930892

Trust: 2.5

url:http://xforce.iss.net/xforce/alerts/id/201

Trust: 1.9

url:http://secunia.com/advisories/16272/

Trust: 1.7

url:http://www.osvdb.org/18332

Trust: 1.7

url:http://securitytracker.com/id?1014598

Trust: 1.7

url:http://secunia.com/advisories/16272

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5445

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/21591

Trust: 1.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00804d82c9.shtml

Trust: 0.8

url:http://www.boingboing.net/2005/07/29/michael_lynns_contro.html

Trust: 0.8

url:http://www.blackhat.com/html/bh-usa-05/bh-usa-05-speakers.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2451

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2005/1264

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2005/wr053001.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23930892/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta05-210a

Trust: 0.8

url:http://jvn.jp/tr/trta05-210a

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-2451

Trust: 0.8

url:http://securitytracker.com/alerts/2005/jul/1014598.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/21591

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5445

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml#details

Trust: 0.3

url:http://www.irmplc.com/download_pdf.php?src=cisco_ios_exploitation_techniques.pdf&force=yes

Trust: 0.3

url:http://www.us-cert.gov/cas/techalerts/ta05-210a.html>

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_advisory091

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/930892>

Trust: 0.1

url:http://www.cisco.com/go/psirt.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/50/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/182/

Trust: 0.1

sources: CERT/CC: VU#930892 // VULHUB: VHN-13660 // BID: 14414 // JVNDB: JVNDB-2005-000460 // PACKETSTORM: 39015 // PACKETSTORM: 38953 // NVD: CVE-2005-2451 // CNNVD: CNNVD-200508-039

CREDITS

This issue was reported by Michael Lynn at the Black Hat security conference.

Trust: 0.9

sources: BID: 14414 // CNNVD: CNNVD-200508-039

SOURCES

db:CERT/CCid:VU#930892
db:VULHUBid:VHN-13660
db:BIDid:14414
db:JVNDBid:JVNDB-2005-000460
db:PACKETSTORMid:39015
db:PACKETSTORMid:38953
db:NVDid:CVE-2005-2451
db:CNNVDid:CNNVD-200508-039

LAST UPDATE DATE

2023-12-18T11:31:39.658000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#930892date:2005-08-02T00:00:00
db:VULHUBid:VHN-13660date:2017-10-11T00:00:00
db:BIDid:14414date:2007-06-28T03:58:00
db:JVNDBid:JVNDB-2005-000460date:2007-04-01T00:00:00
db:NVDid:CVE-2005-2451date:2017-10-11T01:30:16.700
db:CNNVDid:CNNVD-200508-039date:2009-03-04T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#930892date:2005-07-29T00:00:00
db:VULHUBid:VHN-13660date:2005-08-03T00:00:00
db:BIDid:14414date:2005-07-27T00:00:00
db:JVNDBid:JVNDB-2005-000460date:2007-04-01T00:00:00
db:PACKETSTORMid:39015date:2005-08-05T05:41:02
db:PACKETSTORMid:38953date:2005-08-02T23:53:24
db:NVDid:CVE-2005-2451date:2005-08-03T04:00:00
db:CNNVDid:CNNVD-200508-039date:2005-08-03T00:00:00