ID

VAR-200305-0089


TITLE

Cisco IOS Service Assurance Agent Malformed Packet Denial Of Service Vulnerability

Trust: 0.3

sources: BID: 7607

DESCRIPTION

It has been reported that Cisco IOS is vulnerable to an issue in handling Service Assurance Agent (previously called Response Time Reporter, or RTR) packets. Because of this, a remote user may be able to cause the router to become unstable and crash.

Trust: 0.3

sources: BID: 7607

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 1.2

vendor:ciscomodel:ios 12.1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.0 stscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 dascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(7)

Trust: 0.3

vendor:ciscomodel:ios 12.2 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1(11)

Trust: 0.3

vendor:ciscomodel:ios 12.1 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0spscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sxscope: - version: -

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:800

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7300

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7200

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7100

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7010

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7000

Trust: 0.3

vendor:ciscomodel:nspscope:eqversion:6400

Trust: 0.3

vendor:ciscomodel:nrpscope:eqversion:6400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:6400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:6200

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3800

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1400

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:12000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:10700

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1005

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:1000

Trust: 0.3

sources: BID: 7607

THREAT TYPE

network

Trust: 0.3

sources: BID: 7607

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 7607

EXTERNAL IDS

db:BIDid:7607

Trust: 0.3

sources: BID: 7607

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml

Trust: 0.3

sources: BID: 7607

CREDITS

This vulnerability was reported by the vendor.

Trust: 0.3

sources: BID: 7607

SOURCES

db:BIDid:7607

LAST UPDATE DATE

2022-05-17T01:52:13.615000+00:00


SOURCES UPDATE DATE

db:BIDid:7607date:2003-05-15T00:00:00

SOURCES RELEASE DATE

db:BIDid:7607date:2003-05-15T00:00:00