ID
VAR-200305-0089
TITLE
Cisco IOS Service Assurance Agent Malformed Packet Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
It has been reported that Cisco IOS is vulnerable to an issue in handling Service Assurance Agent (previously called Response Time Reporter, or RTR) packets. Because of this, a remote user may be able to cause the router to become unstable and crash.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.0 s | scope: | - | version: | - | Trust: 1.2 |
vendor: | cisco | model: | ios 12.1 | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.0 st | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 da | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2(7) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ey | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ew | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ec | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ea | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1(11) | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ey | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1 e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0wc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0st | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 800 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7600 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7500 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7300 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7200 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7100 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7010 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 7000 | Trust: 0.3 |
vendor: | cisco | model: | nsp | scope: | eq | version: | 6400 | Trust: 0.3 |
vendor: | cisco | model: | nrp | scope: | eq | version: | 6400 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 6400 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 6200 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 4700 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 4500 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 4000 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 3800 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 3600 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 3000 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 2600 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 2500 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1700 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1600 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1500 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1400 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 12000 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 10700 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1005 | Trust: 0.3 |
vendor: | cisco | model: | - | scope: | eq | version: | 1000 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 7607 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml | Trust: 0.3 |
CREDITS
This vulnerability was reported by the vendor.
Trust: 0.3
SOURCES
db: | BID | id: | 7607 |
LAST UPDATE DATE
2022-05-17T01:52:13.615000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 7607 | date: | 2003-05-15T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 7607 | date: | 2003-05-15T00:00:00 |