ID
VAR-E-201003-0088
CVE
cve_id: | CVE-2010-0582 | Trust: 0.3 |
TITLE
Cisco IOS H.323 Interface Queue Resource Exhaustion Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to consume all available space in the H.323 interface queue, resulting in a queue wedge, which may prevent new packets from being processed.
This issue is being tracked by Cisco Bug ID CSCtb19962.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3tpc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xne | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xna | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2tpc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | ne | version: | 2.5.1 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xn | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 yb5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 xm3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 xm | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t12 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 jk1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xi11 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 tpc11a | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xa7 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 jk3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yk3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sb | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 zb | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 xne1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 mc2b | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 mc1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 yv1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | ne | version: | 12.2 | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Unknown
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2010-0582 | Trust: 0.3 |
db: | BID | id: | 38931 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/ | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/products_security_advisory09186a0080b20ee4.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 38931 |
LAST UPDATE DATE
2022-07-27T09:59:24.189000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 38931 | date: | 2010-03-24T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 38931 | date: | 2010-03-24T00:00:00 |