ID
VAR-E-200501-0112
CVE
cve_id: | CVE-2005-0195 | Trust: 0.3 |
TITLE
Cisco IOS IPv6 Processing Remote Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
A remote denial of service vulnerability affects the IPv6 processing functionality of Cisco IOS. This issue is due to a failure of the affected operating system to properly handle specially crafted network data.
It is possible for an attacker to produce a sustained denial of service condition against an affected device by continually sending the malicious network data.
An attacker may leverage this issue to cause an affected device to reload, denying service to legitimate users.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.2cx | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zg | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zd | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2sz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.0sz | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.3yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ja | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2su | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ewa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0s | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.
Trust: 0.3
EXTERNAL IDS
db: | CERT/CC | id: | VU#472582 | Trust: 0.3 |
db: | NVD | id: | CVE-2005-0195 | Trust: 0.3 |
db: | BID | id: | 12368 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/472582 | Trust: 0.3 |
SOURCES
db: | BID | id: | 12368 |
LAST UPDATE DATE
2022-07-27T09:23:38.348000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 12368 | date: | 2009-07-12T10:06:00 |
SOURCES RELEASE DATE
db: | BID | id: | 12368 | date: | 2005-01-26T00:00:00 |