ID
VAR-E-200501-0178
CVE
cve_id: | CVE-2005-0197 | Trust: 0.3 |
TITLE
Cisco IOS Multi Protocol Label Switching Remote Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS based routers that are configured with support for Multi Protocol Label Switching (MPLS) are reported prone to a remote denial of service vulnerability.
It is reported that the vulnerability presents itself when an affected router handles an unspecified malicious packet on a MPLS disabled interface.
A remote attacker that resides on the same network segment as the vulnerable router may exploit this vulnerability continuously to effectively deny network-based services to legitimate users.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.3yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2su | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ja | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ewa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2dx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2dd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1dc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1db | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.
Trust: 0.3
EXTERNAL IDS
db: | CERT/CC | id: | VU#583638 | Trust: 0.3 |
db: | NVD | id: | CVE-2005-0197 | Trust: 0.3 |
db: | BID | id: | 12369 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/en/us/products/products_security_advisory09186a00803be77c.shtml | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/583638 | Trust: 0.3 |
SOURCES
db: | BID | id: | 12369 |
LAST UPDATE DATE
2022-07-27T09:41:50.247000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 12369 | date: | 2009-07-12T10:06:00 |
SOURCES RELEASE DATE
db: | BID | id: | 12369 | date: | 2005-01-26T00:00:00 |