ID

VAR-E-200803-0750


CVE

cve_id:CVE-2008-1150

Trust: 0.3

cve_id:CVE-2008-1151

Trust: 0.3

sources: BID: 28460

TITLE

Cisco IOS Virtual Private Dial-up Network Multiple Denial of Service Vulnerabilities

Trust: 0.3

sources: BID: 28460

DESCRIPTION

Cisco IOS is prone to multiple denial-of-service vulnerabilities that occur in the virtual private dial-up (VPDN) when the Point-to-Point Tunneling Protocol (PPTP) is enabled.
Successfully exploiting these issues may cause a memory leak or prevent the establishment of VPDN connections, denying service to legitimate users.

Trust: 0.3

sources: BID: 28460

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xb5scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.1 ea11scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2xv

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ayscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(26)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 byscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bw1ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bw1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 srcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s15scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxf13scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(18)2

Trust: 0.3

vendor:ciscomodel:ios 12.2 t4escope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ay1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1scope:neversion: -

Trust: 0.3

sources: BID: 28460

EXPLOIT

A specific exploit is not required. The attacker would only need to establish a PPTP session with an affected device.

Trust: 0.3

sources: BID: 28460

PRICE

Free

Trust: 0.3

sources: BID: 28460

TYPE

Design Error

Trust: 0.3

sources: BID: 28460

CREDITS

Martin Kluge of Elxsi Security

Trust: 0.3

sources: BID: 28460

EXTERNAL IDS

db:NVDid:CVE-2008-1150

Trust: 0.3

db:NVDid:CVE-2008-1151

Trust: 0.3

db:BIDid:28460

Trust: 0.3

sources: BID: 28460

REFERENCES

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-pptp.shtml

Trust: 0.3

sources: BID: 28460

SOURCES

db:BIDid:28460

LAST UPDATE DATE

2022-07-27T10:04:12.453000+00:00


SOURCES UPDATE DATE

db:BIDid:28460date:2008-03-26T20:49:00

SOURCES RELEASE DATE

db:BIDid:28460date:2008-03-26T00:00:00