ID
VAR-E-201003-0748
CVE
cve_id: | CVE-2010-0579 | Trust: 0.3 |
TITLE
Cisco IOS SIP Message (CVE-2010-0579) Remote Code Execution Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a remote code-execution service vulnerability.
The attacker can exploit this issue to execute arbitrary code with elevated privileges on affected devices. Successful exploits will completely compromise an affected device.
This issue is tracked by Cisco Bug ID CSCtb93416.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.4 t3 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.4yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4md | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0m | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xn | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 mr | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 ye | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 md | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 ye2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 yb5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 xr3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 mda2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yk3 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
The vendor reports that exploits for this issue are available.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2010-0579 | Trust: 0.3 |
db: | BID | id: | 38935 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/products_security_advisory09186a0080b20f32.shtml#12_4 | Trust: 0.3 |
SOURCES
db: | BID | id: | 38935 |
LAST UPDATE DATE
2022-07-27T10:01:36.842000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 38935 | date: | 2010-03-30T16:52:00 |
SOURCES RELEASE DATE
db: | BID | id: | 38935 | date: | 2010-03-24T00:00:00 |