ID

VAR-E-201003-1412


CVE

cve_id:CVE-2010-0585

Trust: 0.3

sources: BID: 38936

TITLE

Cisco IOS For Communication Manager Express SCCP (CVE-2010-0585) Denial of Service Vulnerability

Trust: 0.3

sources: BID: 38936

DESCRIPTION

Cisco IOS, configured for use on Cisco Communication Manager Express, is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to crash and reload, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCsz48614.

Trust: 0.3

sources: BID: 38936

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xndscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xncscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 zh6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 yb5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 yj1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ya8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mc2bscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 yv1scope:neversion: -

Trust: 0.3

sources: BID: 38936

EXPLOIT

To exploit this issue, attackers can use readily available network utilities.

Trust: 0.3

sources: BID: 38936

PRICE

Free

Trust: 0.3

sources: BID: 38936

TYPE

Design Error

Trust: 0.3

sources: BID: 38936

CREDITS

Cisco

Trust: 0.3

sources: BID: 38936

EXTERNAL IDS

db:NVDid:CVE-2010-0585

Trust: 0.3

db:BIDid:38936

Trust: 0.3

sources: BID: 38936

REFERENCES

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b20f33.shtml

Trust: 0.3

sources: BID: 38936

SOURCES

db:BIDid:38936

LAST UPDATE DATE

2022-07-27T09:59:23.291000+00:00


SOURCES UPDATE DATE

db:BIDid:38936date:2010-03-24T00:00:00

SOURCES RELEASE DATE

db:BIDid:38936date:2010-03-24T00:00:00