ID

VAR-E-200909-1007


CVE

cve_id:CVE-2009-2866

Trust: 0.3

sources: BID: 36494

TITLE

Cisco IOS H.323 Denial of Service Vulnerability

Trust: 0.3

sources: BID: 36494

DESCRIPTION

Cisco IOS is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCsz38104.

Trust: 0.3

sources: BID: 36494

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t1scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 t2scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3vascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xrscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xmscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xu1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi11scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 tpc11ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ys1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mc2bscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bxscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 yv1scope:neversion: -

Trust: 0.3

sources: BID: 36494

EXPLOIT

To exploit this issue, attackers can use readily available network utilities.

Trust: 0.3

sources: BID: 36494

PRICE

Free

Trust: 0.3

sources: BID: 36494

TYPE

Design Error

Trust: 0.3

sources: BID: 36494

CREDITS

Cisco

Trust: 0.3

sources: BID: 36494

EXTERNAL IDS

db:NVDid:CVE-2009-2866

Trust: 0.3

db:BIDid:36494

Trust: 0.3

sources: BID: 36494

REFERENCES

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080af811a.shtml

Trust: 0.3

sources: BID: 36494

SOURCES

db:BIDid:36494

LAST UPDATE DATE

2022-07-27T09:33:38.382000+00:00


SOURCES UPDATE DATE

db:BIDid:36494date:2009-09-23T17:20:00

SOURCES RELEASE DATE

db:BIDid:36494date:2009-09-23T00:00:00