ID
VAR-E-201009-0951
CVE
cve_id: | CVE-2010-2831 | Trust: 0.3 |
TITLE
Cisco IOS NAT Functionality Session Initiation Protocol Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a remote denial-of-service vulnerability.
An attacker can exploit these issues to cause an affected device to crash, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCtf17624.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 15.1xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0xo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mra | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mda | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4md | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3va | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3tpc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xne | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xnb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xna | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sv | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sre | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2scd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2scc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2scb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sbc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mrb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mra | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ixa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ire | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ird | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ira | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | ne | version: | 2.6.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 t1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 jk1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 xi11 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 jk3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yx17 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2se | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sb | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sg | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scd4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scd3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scc5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scb9 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 mrb2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 s | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sw12 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sxf11 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sx2 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Unknown
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2010-2831 | Trust: 0.3 |
db: | BID | id: | 43393 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/ | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/products_security_advisory09186a0080b4a311.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 43393 |
LAST UPDATE DATE
2022-07-27T09:19:26.596000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 43393 | date: | 2010-09-22T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 43393 | date: | 2010-09-22T00:00:00 |