Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4924

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-27 Sep, 2006 | 01:00
Updated At-07 Aug, 2024 | 19:32
Rejected At-
Credits

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:27 Sep, 2006 | 01:00
Updated At:07 Aug, 2024 | 19:32
Rejected At:
▼CVE Numbering Authority (CNA)

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
http://sourceforge.net/forum/forum.php?forum_id=681763
x_refsource_CONFIRM
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
x_refsource_CONFIRM
http://secunia.com/advisories/22270
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-355-1
vendor-advisory
x_refsource_UBUNTU
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0740
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/21923
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24805
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
http://www.openbsd.org/errata.html#ssh
vendor-advisory
x_refsource_OPENBSD
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200611-06.xml
vendor-advisory
x_refsource_GENTOO
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
http://bugs.gentoo.org/show_bug.cgi?id=148228
x_refsource_CONFIRM
http://secunia.com/advisories/22164
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
vendor-advisory
x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22362
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/34274
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/787448
third-party-advisory
x_refsource_CERT-VN
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
http://securitytracker.com/id?1016931
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22352
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22236
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/24799
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
x_refsource_MISC
http://secunia.com/advisories/22091
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22495
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1332
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/20216
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/447153/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200609-17.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/22823
third-party-advisory
x_refsource_SECUNIA
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
vendor-advisory
x_refsource_SLACKWARE
http://www.redhat.com/support/errata/RHSA-2006-0697.html
vendor-advisory
x_refsource_REDHAT
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3777
vdb-entry
x_refsource_VUPEN
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
vendor-advisory
x_refsource_OPENPKG
http://secunia.com/advisories/22183
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
vdb-entry
x_refsource_XF
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2119
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/22926
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29371
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22208
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/22245
third-party-advisory
x_refsource_SECUNIA
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
https://issues.rpath.com/browse/RPL-661
x_refsource_CONFIRM
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1212
vendor-advisory
x_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
vdb-entry
signature
x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
http://www.osvdb.org/29152
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/25608
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22158
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2006/dsa-1189
vendor-advisory
x_refsource_DEBIAN
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
x_refsource_CONFIRM
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
vendor-advisory
x_refsource_SCO
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Resource:
x_refsource_CONFIRM
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22270
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/21923
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24805
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openbsd.org/errata.html#ssh
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22164
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22362
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/34274
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
Hyperlink: http://securitytracker.com/id?1016931
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22352
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22236
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/24799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/22091
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22495
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/20216
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/22823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://secunia.com/advisories/22183
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/22926
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29371
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22208
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22245
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: https://issues.rpath.com/browse/RPL-661
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.osvdb.org/29152
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/25608
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22158
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Resource:
vendor-advisory
x_refsource_SCO
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://sourceforge.net/forum/forum.php?forum_id=681763
x_refsource_CONFIRM
x_transferred
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22270
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-355-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/0740
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/21923
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24805
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openbsd.org/errata.html#ssh
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://security.gentoo.org/glsa/glsa-200611-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
x_refsource_CONFIRM
x_transferred
http://bugs.gentoo.org/show_bug.cgi?id=148228
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22164
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22362
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/34274
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/787448
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://docs.info.apple.com/article.html?artnum=305214
x_refsource_CONFIRM
x_transferred
http://securitytracker.com/id?1016931
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2006/4869
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22352
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22236
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/24799
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
x_refsource_MISC
x_transferred
http://secunia.com/advisories/22091
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22495
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1332
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/20216
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/447153/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://security.gentoo.org/glsa/glsa-200609-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/22823
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0697.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/3777
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://secunia.com/advisories/22183
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
vdb-entry
x_refsource_XF
x_transferred
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/23241
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2119
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/0930
vdb-entry
x_refsource_VUPEN
x_transferred
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/22926
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29371
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22208
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22245
third-party-advisory
x_refsource_SECUNIA
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
https://issues.rpath.com/browse/RPL-661
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22196
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1212
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0698.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.osvdb.org/29152
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/25608
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22158
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2006/dsa-1189
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
x_refsource_CONFIRM
x_transferred
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
vendor-advisory
x_refsource_SCO
x_transferred
http://secunia.com/advisories/24479
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22270
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/21923
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24805
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openbsd.org/errata.html#ssh
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22164
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22362
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/34274
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://securitytracker.com/id?1016931
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22352
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22236
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/24799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/22091
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22495
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20216
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/22823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://secunia.com/advisories/22183
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/23241
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/22926
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29371
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22208
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22245
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-661
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22196
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.osvdb.org/29152
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/25608
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22158
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Resource:
vendor-advisory
x_refsource_SCO
x_transferred
Hyperlink: http://secunia.com/advisories/24479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:27 Sep, 2006 | 01:07
Updated At:17 Oct, 2018 | 21:40

sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

OpenBSD
openbsd
>>openssh>>1.2
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.1
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.2
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.3
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>1.2.27
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.1
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.1.1
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.2
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.3
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5.1
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.5.2
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9.9
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9.9p2
cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9p1
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>2.9p2
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.1p1
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0.2p1
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.0p1
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.1p1
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2
cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.2p1
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.2.3p1
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.3p1
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.4p1
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.5p1
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p1
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.6.1p2
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p1
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.7.1p2
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.8.1p1
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>3.9.1p1
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openssh>>4.0
cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.ascsecalert@redhat.com
N/A
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txtsecalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascsecalert@redhat.com
N/A
http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerabilitysecalert@redhat.com
N/A
http://bugs.gentoo.org/show_bug.cgi?id=148228secalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=305214secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.htmlsecalert@redhat.com
N/A
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2secalert@redhat.com
N/A
http://secunia.com/advisories/21923secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22091secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22116secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22158secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22164secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22183secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22196secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22208secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22236secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22245secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22270secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22298secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22352secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22362secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22487secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22495secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22823secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22926secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23038secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23241secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23340secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23680secalert@redhat.com
N/A
http://secunia.com/advisories/24479secalert@redhat.com
N/A
http://secunia.com/advisories/24799secalert@redhat.com
N/A
http://secunia.com/advisories/24805secalert@redhat.com
N/A
http://secunia.com/advisories/25608secalert@redhat.com
N/A
http://secunia.com/advisories/29371secalert@redhat.com
N/A
http://secunia.com/advisories/34274secalert@redhat.com
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.ascsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200609-17.xmlsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200611-06.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1016931secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566secalert@redhat.com
N/A
http://sourceforge.net/forum/forum.php?forum_id=681763secalert@redhat.com
N/A
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-216.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-262.htmsecalert@redhat.com
N/A
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1189secalert@redhat.com
Patch
http://www.debian.org/security/2006/dsa-1212secalert@redhat.com
Patch
http://www.kb.cert.org/vuls/id/787448secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_24_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_62_openssh.htmlsecalert@redhat.com
N/A
http://www.openbsd.org/errata.html#sshsecalert@redhat.com
N/A
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/29152secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0697.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0698.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/447153/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/20216secalert@redhat.com
Exploit
Patch
http://www.trustix.org/errata/2006/0054secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-355-1secalert@redhat.com
N/A
http://www.us-cert.gov/cas/techalerts/TA07-072A.htmlsecalert@redhat.com
US Government Resource
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3777secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4869secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0930secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1332secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2119secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2009/0740secalert@redhat.com
N/A
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955secalert@redhat.com
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29158secalert@redhat.com
N/A
https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sgsecalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-661secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193secalert@redhat.com
N/A
Hyperlink: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://blogs.sun.com/security/entry/sun_alert_102962_security_vulnerability
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=148228
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=305214
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21923
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22091
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22116
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22158
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22164
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22183
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22196
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22208
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22236
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22245
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22270
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22298
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22352
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22362
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22487
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22495
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22823
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22926
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23038
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23241
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23340
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24479
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24799
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24805
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25608
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29371
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/34274
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-17.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200611-06.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016931
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/forum/forum.php?forum_id=681763
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-262.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1189
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.debian.org/security/2006/dsa-1212
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.kb.cert.org/vuls/id/787448
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_62_openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openbsd.org/errata.html#ssh
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/29152
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0697.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0698.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/447153/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20216
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.trustix.org/errata/2006/0054
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-355-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3777
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4869
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1332
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2119
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0740
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29158
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://hypersonic.bluecoat.com/support/securityadvisories/ssh_server_on_sg
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-661
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10462
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1193
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

135Records found

CVE-2009-1139
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-59.26% / 98.16%
||
7 Day CHG~0.00%
Published-10 Jun, 2009 | 17:37
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-adamwindows_xpwindows_2000windows_server_2003n/a
CWE ID-CWE-399
Not Available
CVE-2009-0758
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.12% / 77.35%
||
7 Day CHG~0.00%
Published-03 Mar, 2009 | 16:00
Updated-07 Aug, 2024 | 04:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.

Action-Not Available
Vendor-avahin/a
Product-avahi-daemonn/a
CWE ID-CWE-399
Not Available
CVE-2009-1165
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.64% / 69.72%
||
7 Day CHG~0.00%
Published-29 Jul, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0, 5.1 before 5.1.163.0, and 5.0 and 5.2 before 5.2.178.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to cause a denial of service (memory consumption and device reload) via SSH management connections, aka Bug ID CSCsw40789.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cisco_4100_wireless_lan_controllercisco_4400_wireless_lan_controllercisco_1500_wireless_lan_controllercisco_4200_wireless_lan_controllercisco_2100_wireless_lan_controllercisco_2000_wireless_lan_controllercatalyst_3750gn/a
CWE ID-CWE-399
Not Available
CVE-2009-1163
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.64% / 69.72%
||
7 Day CHG~0.00%
Published-24 Jun, 2009 | 22:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak on the Cisco Physical Access Gateway with software before 1.1 allows remote attackers to cause a denial of service (memory consumption) via unspecified TCP packets.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-physical_access_gatewayn/a
CWE ID-CWE-399
Not Available
CVE-2009-0626
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.18% / 77.86%
||
7 Day CHG~0.00%
Published-27 Mar, 2009 | 16:00
Updated-07 Aug, 2024 | 04:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-399
Not Available
CVE-2019-1957
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.52% / 65.71%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-19 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IoT Field Network Director TLS Renegotiation Denial of Service Vulnerability

A vulnerability in the web interface of Cisco IoT Field Network Director could allow an unauthenticated, remote attacker to trigger high CPU usage, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of Transport Layer Security (TLS) renegotiation requests. An attacker could exploit this vulnerability by sending renegotiation requests at a high rate. A successful exploit could increase the resource usage on the system, eventually leading to a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iot_field_network_directorCisco IoT Field Network Director (IoT-FND)
CWE ID-CWE-399
Not Available
CVE-2008-7201
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.50% / 64.90%
||
7 Day CHG~0.00%
Published-10 Sep, 2009 | 10:00
Updated-16 Sep, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lantronix MSS485-T allows remote attackers to cause a denial of service (unstable performance and service loss) via certain vulnerability scans, as demonstrated using (1) Nessus and (2) nmap.

Action-Not Available
Vendor-lantronixn/a
Product-mss485-tn/a
CWE ID-CWE-399
Not Available
CVE-2019-1967
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.57% / 84.96%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 21:45
Updated-19 Nov, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability

A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_93120txnexus_93128txnexus_9336pq_aci_spinenexus_6004mds_9140nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_7000_9-slotnexus_9364cnexus_92348gc-xnexus_3172tq-32tnexus_9336c-fx2nexus_3164qmds_9200nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172mds_9000nexus_9272qnexus_3464cmds_9700nexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qnexus_3432d-snexus_34180ycnexus_9000vnexus_31108pc-vnexus_7700_18-slotnexus_5596upnexus_3524nexus_3548mds_9500nexus_7000_4-slotnexus_7700_6-slotnexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_7700_10-slotmds_9100nexus_9504nexus_3048nexus_9372tx-enexus_6001nexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlnexus_9396txnexus_7000_10-slotnexus_7000nexus_92300ycnexus_3064nexus_3232cnexus_5548upnexus_9396pxnexus_5596tnexus_3264c-enexus_7700_2-slotnexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_3172tq-xlnexus_93180yc-exnexus_3408-snexus_9372px-enexus_7000_18-slotnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-1718
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.53% / 66.38%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 22:00
Updated-19 Nov, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine SSL Renegotiation Denial of Service Vulnerability

A vulnerability in the web interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to trigger high CPU usage, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of Secure Sockets Layer (SSL) renegotiation requests. An attacker could exploit this vulnerability by sending renegotiation requests at a high rate. An successful exploit could increase the resource usage on the system, eventually leading to a DoS condition. This vulnerability affects version 2.1.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-399
Not Available
CVE-2019-1635
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.16% / 77.68%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 14:55
Updated-19 Nov, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability

A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ip_phone_8841ip_phone_8861ip_conference_phone_8832ip_phone_8845_firmwareip_phone_7841ip_phone_7811_firmwareunified_ip_8831_conference_phone_for_third-party_call_control2ip_phone_8811wireless_ip_phone_8821-ex_firmwareip_phone_8811_firmwareip_conference_phone_8832_firmwareip_phone_7861_firmwareunified_ip_8831_conference_phone1ip_phone_8845ip_phone_8851_firmwareip_phone_7821_firmwareip_phone_8841_firmwareip_phone_8865_firmwareip_conference_phone_7832ip_phone_8865ip_phone_7841_firmwareunified_ip_8831_conference_phone_for_third-party_call_control2_firmwarewireless_ip_phone_8821-exip_conference_phone_7832_firmwareunified_ip_8831_conference_phone1_firmwareip_phone_7811ip_phone_7861ip_phone_8851ip_phone_8861_firmwarewireless_ip_phone_8821ip_phone_7821wireless_ip_phone_8821_firmwareCisco Wireless IP Phone 8821 and 8821-EXCisco IP Phone 7800 Series and 8800 Series
CWE ID-CWE-399
Not Available
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2019-1599
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-6.85% / 90.97%
||
7 Day CHG~0.00%
Published-07 Mar, 2019 | 20:00
Updated-19 Nov, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Netstack Denial of Service Vulnerability

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_3500nexus_9000ucs_6300nexus_9500nx-osnexus_3000nexus_6000nexus_3600nexus_1000vucs_6400ucs_6200nexus_7000nexus_5500nexus_5600nexus_7700Nexus 1000V Switch for VMware vSphereNexus 3600 Platform SwitchesNexus 9000 Series Switches in Standalone NX-OS ModeNexus 3500 Platform SwitchesNexus 7000 and 7700 Series SwitchesUCS 6400 Series Fabric InterconnectNexus 5500, 5600, and 6000 Series SwitchesUCS 6200 and 6300 Series Fabric InterconnectNexus 1000V Switch for Microsoft Hyper-VNexus 3000 Series SwitchesNexus 9500 R-Series Line Cards and Fabric Modules
CWE ID-CWE-399
Not Available
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2019-15256
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.16% / 77.68%
||
7 Day CHG~0.00%
Published-02 Oct, 2019 | 19:06
Updated-19 Nov, 2024 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability

A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker's source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5510_firmwareadaptive_security_appliance_softwareasa_5520asa_5505_firmwareasa_5510asa_5540_firmwareasa_5580_firmwareasa_5520_firmwareasa_5515-xasa_5550asa_5545-x_firmwareasa_5545-xasa_5525-x_firmwareasa_5505asa_5540asa_5555-xasa_5580asa_5515-x_firmwareasa_5525-xasa_5555-x_firmwareasa_5512-x_firmwareasa_5550_firmwareasa_5512-xfirepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2007-2246
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.27% / 83.98%
||
7 Day CHG~0.00%
Published-25 Apr, 2007 | 16:00
Updated-07 Aug, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434.

Action-Not Available
Vendor-sendmailn/aHP Inc.
Product-sendmailhp-uxn/a
CWE ID-CWE-399
Not Available
CVE-2009-1164
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.64% / 69.59%
||
7 Day CHG~0.00%
Published-29 Jul, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The administrative web interface on the Cisco Wireless LAN Controller (WLC) platform 4.2 before 4.2.205.0 and 5.x before 5.2.178.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to cause a denial of service (device reload) via a malformed response to a (1) HTTP or (2) HTTPS authentication request, aka Bug ID CSCsx03715.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cisco_4100_wireless_lan_controllercisco_4400_wireless_lan_controllercisco_1500_wireless_lan_controllercisco_4200_wireless_lan_controllercisco_2100_wireless_lan_controllercisco_2000_wireless_lan_controllercatalyst_3750gn/a
CWE ID-CWE-399
Not Available
CVE-2018-15391
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.50% / 65.08%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Remote PHY IPv4 Fragment Denial of Service Vulnerability

A vulnerability in certain IPv4 fragment-processing functions of Cisco Remote PHY Software could allow an unauthenticated, remote attacker to impact traffic passing through a device, potentially causing a denial of service (DoS) condition. The vulnerability is due to the affected software not validating and calculating certain numerical values in IPv4 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending malformed IPv4 traffic to an affected device. A successful exploit could allow the attacker to disrupt the flow of certain IPv4 traffic passing through an affected device, which could result in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-remoteCisco Remote PHY
CWE ID-CWE-399
Not Available
CWE ID-CWE-682
Incorrect Calculation
CVE-2018-15462
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.46% / 63.11%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 14:45
Updated-19 Nov, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software TCP Ingress Handler Denial of Service Vulnerability

A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an increase in CPU and memory usage, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient ingress TCP rate limiting for TCP ports 22 (SSH) and 443 (HTTPS). An attacker could exploit this vulnerability by sending a crafted, steady stream of TCP traffic to port 22 or 443 on the data interfaces that are configured with management access to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2019-12652
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-3.18% / 86.45%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:16
Updated-19 Nov, 2024 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Catalyst 4000 Series Switches TCP Denial of Service Vulnerability

A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ioscatalyst_4500_supervisor_engine_6-ecatalyst_4500_supervisor_engine_6l-ecatalyst_4948ecatalyst_4900mcatalyst_4948e-fCisco IOS 15.0(1)XO1
CWE ID-CWE-399
Not Available
CVE-2017-6779
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.27% / 78.71%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 12:00
Updated-31 Jul, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable. This vulnerability affects the following Cisco Voice Operating System (VOS)-based products: Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IM&P - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection, Virtualized Voice Browser. This vulnerability also affects Prime Collaboration Assurance and Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818, CSCvi31823.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-hosted_collaboration_mediation_fulfillmentmediasenseprime_license_managerunified_communications_managerunified_contact_center_expressunified_intelligence_centervirtualized_voice_browseremergency_responderprime_collaboration_provisioningsocialminerprime_collaboration_assurancefinesseunity_connectionMultiple Cisco Products unknown
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2019-12646
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.16% / 77.68%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:00
Updated-19 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software NAT Session Initiation Protocol Application Layer Gateway Denial of Service Vulnerability

A vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper processing of transient SIP packets on which NAT is performed on an affected device. An attacker could exploit this vulnerability by using UDP port 5060 to send crafted SIP packets through an affected device that is performing NAT for SIP packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xe4221_integrated_services_routerisrv4331_integrated_services_router1101-4p1109-4p1111x-8p1100-8p1100-4p1109-2pencs_5100encs_5400csr_1000vCisco IOS XE Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-665
Improper Initialization
CVE-2018-0252
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.48% / 64.31%
||
7 Day CHG~0.00%
Published-02 May, 2018 | 22:00
Updated-29 Nov, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the IP Version 4 (IPv4) fragment reassembly function of Cisco 3500, 5500, and 8500 Series Wireless LAN Controller Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a corruption of an internal data structure process that occurs when the affected software reassembles certain IPv4 packets. An attacker could exploit this vulnerability by sending certain malformed IPv4 fragments to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability affects all releases of 8.4 until the first fixed release for the 5500 and 8500 Series Wireless LAN Controllers and releases 8.5.103.0 and 8.5.105.0 for the 3500, 5500, and 8500 Series Wireless LAN Controllers. Cisco Bug IDs: CSCvf89222.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wireless_lan_controller_softwareCisco Wireless LAN Controller
CWE ID-CWE-399
Not Available
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-0240
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.59% / 80.88%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 20:00
Updated-29 Nov, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the Application Layer Protocol Inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerabilities are due to logical errors during traffic inspection. An attacker could exploit these vulnerabilities by sending a high volume of malicious traffic across an affected device. An exploit could allow the attacker to cause a deadlock condition, resulting in a reload of an affected device. These vulnerabilities affect Cisco ASA Software and Cisco FTD Software configured for Application Layer Protocol Inspection running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCve61540, CSCvh23085, CSCvh95456.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firepower_9300firepower_4150asa-5545-xasa-5506-xasa-5520firepower_2130catalyst_6513-efirepower_4110isa-3000-2c2fisa-3000-4cfirepower_2110catalyst_6513catalyst_6506-e7606-sfirepower_threat_defense_virtualasa_5555-xasa_5580firepower_4120firepower_threat_defensecatalyst_6509-ecatalyst_6500-easa-5512-xfirepower_21207604asa-5585-xadaptive_security_appliance_softwareasa_5510catalyst_6503-easa_5550firepower_41407613-sasa_5506w-xfirepower_2140asa_5506-xasa-5540asa-5506h-xasa_5516-xasa_5525-xcatalyst_6509-neb-acatalyst_6504-easa-55057609-scatalyst_6509-v-easa_5508-xasa-5515-xasa-5555-xadaptive_security_virtual_applianceCisco Adaptive Security Appliance
CWE ID-CWE-399
Not Available
CVE-2018-0311
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.38% / 79.49%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packets when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could cause process crashes and result in a DoS condition on the device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd69960, CSCve02463, CSCve04859, CSCve41530, CSCve41537, CSCve41541, CSCve41557.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firepower_4150nexus_56128pnexus_2232tm-e_10genexus_3132q-xnexus_3172tqnexus_9332pqnexus_2148tnexus_93108tc-exnx-osnexus_3636c-rfirepower_9300_security_appliancenexus_9508nexus_3100-vnexus_93120txnexus_n9k-x9636c-rfirepower_4110nexus_93128txnexus_3548-xlnexus_31128pqnexus_6001pnexus_3164qnexus_5020nexus_3172tq-32tnexus_2224tp_genexus_3524-xnexus_3132c-znexus_5548pnexus_5648qnexus_9272qucs_6120xpnexus_5672upnexus_3264qfirepower_4140nexus_34180ycnexus_3064-32tnexus_5596upnexus_3548nexus_2248tp_genexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xucs_6248upnexus_n9k-x9636q-rnexus_n9k-c9508-fm-rnexus_9504nexus_3048nexus_2232pp_10genexus_3524-xlucs_6324nexus_9396txfirepower_4120nexus_7000nexus_2248tp-enexus_3172pqnexus_3064-xucs_6332nexus_3232cnexus_5548upnexus_9396pxucs_6296upnexus_5010nexus_5000nexus_2248pq_10genexus_5596tnexus_3264c-efirepower_extensible_operating_systemnexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_2232tm_10geucs_6140xpnexus_6001tnexus_93180yc-exnexus_172tq-xlnexus_c36180yc-rnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco FXOS and NX-OS unknown
CWE ID-CWE-399
Not Available
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-0389
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.46% / 62.94%
||
7 Day CHG~0.00%
Published-13 Mar, 2019 | 21:00
Updated-19 Nov, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability

A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa514g_firmwarespa514gCisco Small Business SPA500 Series IP Phones
CWE ID-CWE-399
Not Available
CVE-2016-10416
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.41%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, and SD 820, UE crash is seen due to IPCMem exhaustion, when UDP data is pumped to UE's ULP (UserPlane Location protocol) UDP port 7275.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9635m_firmwaremdm9640_firmwaresd_412sd_617_firmwaresd_808_firmwaresd_400sd_415sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615sd_650_firmwaresd_625sd_615_firmwaremsm8909w_firmwaremdm9607sd_210mdm9645mdm9645_firmwaresd_650mdm9625_firmwaresd_808sd_820_firmwaresd_820sd_450_firmwaresd_800sd_410sd_617sd_400_firmwaremdm9206sd_652sd_425_firmwaresd_212_firmwaresd_800_firmwaresd_625_firmwaresd_450sd_412_firmwaremdm9635mmdm9615mdm9625mdm9206_firmwaresd_430sd_810mdm9615_firmwaresd_410_firmwaresd_600_firmwaresd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaresd_600msm8909wsd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212mdm9640Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-399
Not Available
CVE-2016-10499
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.41%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, memory leak may occur in the IPSecurity module when repeating IKE-Rekey.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9635m_firmwaremdm9640_firmwaremdm9650sd_615_firmwaremsm8909w_firmwaresd_820mdm9645sd_650sd_450_firmwaresd_845_firmwaresd_410mdm9206sd_652sd_425_firmwaresd_800_firmwaresd_625_firmwaresd_450mdm9635mmdm9615sd_845mdm9206_firmwaremdm9640sd_835_firmwaremdm9650_firmwaresd_835sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_616_firmwaresd_205_firmwaresd_415sd_650_firmwaresd_212sd_412sd_808_firmwaresd_400sdx20sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9655_firmwaresd_625sd_210mdm9607sd_820_firmwaremdm9645_firmwaremdm9625_firmwaresd_808sd_800sd_617sd_400_firmwaresd_212_firmwaresd_850_firmwaremdm9655sd_412_firmwaremdm9625sd_430sd_810mdm9615_firmwaresdx20_firmwaresd_410_firmwaresd_205sd_810_firmwaresd_617_firmwareSnapdragon Mobile, Snapdragon Wear
CWE ID-CWE-399
Not Available
CVE-2016-10459
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.41%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 02:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 617, SD 800, SD 810, and SD 820, during a call, memory exhaustion can occur.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9635m_firmwaremdm9640_firmwaresd_412sd_617_firmwaresd_400sd_415sd_616sd_615sd_615_firmwaresd_210sd_820_firmwaresd_820mdm9645mdm9645_firmwaremdm9625_firmwaresd_800sd_410sd_617sd_400_firmwaremdm9206sd_212_firmwaresd_800_firmwaresd_412_firmwaremdm9635mmdm9615mdm9625mdm9206_firmwaresd_810mdm9615_firmwaresd_410_firmwaresd_205sd_210_firmwaresd_415_firmwaresd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212mdm9640Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-399
Not Available
CVE-2015-9222
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-19.03% / 95.09%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 02:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, processing erroneous bitstreams may result in a HW freeze. FW should detect the HW freeze based on watchdog timer, but because the watchdog timer is not enabled, an infinite loop occurs, resulting in a device freeze.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_427_firmwaresd_412sdm636_firmwaresd_808_firmwaresd_400sd_425sdm660sd_430_firmwaresdm630sd_435sd_650_firmwaresd_625sd_210msm8909w_firmwaresd_820_firmwaresd_820sd_650sd_808sd_450_firmwaresd_800sd_845_firmwaresd_410sd_400_firmwaresd_652sd_425_firmwaresd_212_firmwaresd_800_firmwaresd_625_firmwaresd_450sdm636sd_412_firmwaresdm630_firmwaresd_845sd_430sd_427sd_810sd_435_firmwaresd_835_firmwaresd_410_firmwaresd_835sd_205sd_210_firmwaresd_652_firmwaremsm8909wsd_810_firmwaresd_205_firmwaresdm660_firmwaresd_212Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-399
Not Available
CVE-2009-0020
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.24% / 83.89%
||
7 Day CHG~0.00%
Published-13 Feb, 2009 | 00:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted resource fork that triggers memory corruption.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-399
Not Available
CVE-2008-6219
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.95% / 82.71%
||
7 Day CHG~0.00%
Published-20 Feb, 2009 | 17:00
Updated-07 Aug, 2024 | 11:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-networker_modulenetworker_storage_nodenetworker_servernetworker_powersnapnetworker_clientn/a
CWE ID-CWE-399
Not Available
CVE-2008-6194
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-21.26% / 95.46%
||
7 Day CHG~0.00%
Published-19 Feb, 2009 | 18:00
Updated-07 Aug, 2024 | 11:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the DNS server in Microsoft Windows allows remote attackers to cause a denial of service (memory consumption) via DNS packets. NOTE: this issue reportedly exists because of an incorrect fix for CVE-2007-3898.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windowsn/a
CWE ID-CWE-399
Not Available
CVE-2008-5563
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.81% / 82.08%
||
7 Day CHG~0.00%
Published-15 Dec, 2008 | 17:45
Updated-07 Aug, 2024 | 10:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.x, 3.1.x, 3.2.x, 3.3.1.x, and 3.3.2.x allows remote attackers to cause a denial of service (device crash) via a malformed Extensible Authentication Protocol (EAP) frame.

Action-Not Available
Vendor-n/aAruba Networks
Product-aruba_mobility_controllersaruba_mobility_controllern/a
CWE ID-CWE-399
Not Available
CVE-2008-5620
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.57% / 67.55%
||
7 Day CHG~0.00%
Published-17 Dec, 2008 | 02:00
Updated-07 Aug, 2024 | 10:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RoundCube Webmail (roundcubemail) before 0.2-beta allows remote attackers to cause a denial of service (memory consumption) via crafted size parameters that are used to create a large quota image.

Action-Not Available
Vendor-n/aRoundcube Webmail Project
Product-webmailn/a
CWE ID-CWE-399
Not Available
CVE-2008-5033
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.56% / 67.15%
||
7 Day CHG~0.00%
Published-10 Nov, 2008 | 16:00
Updated-07 Aug, 2024 | 10:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The chip_command function in drivers/media/video/tvaudio.c in the Linux kernel 2.6.25.x before 2.6.25.19, 2.6.26.x before 2.6.26.7, and 2.6.27.x before 2.6.27.3 allows attackers to cause a denial of service (NULL function pointer dereference and OOPS) via unknown vectors.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2008-4678
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.64% / 81.18%
||
7 Day CHG~0.00%
Published-22 Oct, 2008 | 17:00
Updated-07 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTTP_Request_Parser method in the HTTP Transport component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.31 allows remote attackers to cause a denial of service (controller 0C4 abend and application hang) via a long HTTP Host header, related to "storage overlay" on the stack and a "parse failure."

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_application_servern/a
CWE ID-CWE-399
Not Available
CVE-2008-3817
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.48% / 80.21%
||
7 Day CHG~0.00%
Published-23 Oct, 2008 | 21:00
Updated-07 Aug, 2024 | 09:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator."

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_5500_seriespix_security_appliancen/a
CWE ID-CWE-399
Not Available
CVE-2008-4310
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-4.82% / 89.09%
||
7 Day CHG~0.00%
Published-09 Dec, 2008 | 00:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-399
Not Available
CVE-2008-3656
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-67.85% / 98.52%
||
7 Day CHG~0.00%
Published-13 Aug, 2008 | 01:00
Updated-07 Aug, 2024 | 09:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-399
Not Available
CVE-2008-4135
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-13.57% / 93.97%
||
7 Day CHG~0.00%
Published-19 Sep, 2008 | 17:04
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symbian OS S60 3rd edition on the Nokia E90 Communicator 07.40.1.2 Ra-6 and Nseries N82 allows remote attackers to cause a denial of service (device crash) via multiple deauthentication (DeAuth) frames.

Action-Not Available
Vendor-s60n/aNokia Corporation
Product-e90_communicatorsymbian_osn82n/a
CWE ID-CWE-399
Not Available
CVE-2008-2946
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.82% / 73.41%
||
7 Day CHG~0.00%
Published-30 Jun, 2008 | 22:00
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SNMP-DMI mapper subagent daemon (aka snmpXdmid) in Solstice Enterprise Agents in Sun Solaris 8 through 10 allows remote attackers to cause a denial of service (daemon crash) via malformed packets.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-sunossolarisn/a
CWE ID-CWE-399
Not Available
CVE-2008-3196
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.49% / 64.37%
||
7 Day CHG~0.00%
Published-16 Jul, 2008 | 18:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack.

Action-Not Available
Vendor-yaccn/a
Product-yaccn/a
CWE ID-CWE-399
Not Available
CVE-2008-2664
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-4.01% / 87.99%
||
7 Day CHG~0.00%
Published-24 Jun, 2008 | 19:00
Updated-07 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Ruby
Product-ubuntu_linuxdebian_linuxrubyn/a
CWE ID-CWE-399
Not Available
CVE-2008-3263
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-51.55% / 97.80%
||
7 Day CHG~0.00%
Published-22 Jul, 2008 | 23:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.

Action-Not Available
Vendor-n/aAsterisk
Product-asteriskn/a
CWE ID-CWE-399
Not Available
CVE-2008-3283
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-7.32% / 91.30%
||
7 Day CHG~0.00%
Published-29 Aug, 2008 | 18:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests.

Action-Not Available
Vendor-fedoran/aRed Hat, Inc.
Product-directory_servern/a
CWE ID-CWE-399
Not Available
CVE-2008-1749
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.48% / 80.21%
||
7 Day CHG~0.00%
Published-14 May, 2008 | 18:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in Cisco Content Switching Module (CSM) 4.2(3) up to 4.2(8) and Cisco Content Switching Module with SSL (CSM-S) 2.1(2) up to 2.1(7) allows remote attackers to cause a denial of service (memory consumption) via TCP segments with an unspecified combination of TCP flags.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cisco_content_switching_modulecisco_content_switching_module_ssln/a
CWE ID-CWE-399
Not Available
CVE-2008-2136
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-14.97% / 94.29%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-399
Not Available
CVE-2008-1742
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.80% / 73.14%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, as demonstrated by TCPFUZZ, aka Bug ID CSCsj80609.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-399
Not Available
CVE-2008-2090
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.48% / 80.21%
||
7 Day CHG~0.00%
Published-06 May, 2008 | 15:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SCTP protocol implementation in Sun Solaris 10 allows remote attackers to cause a denial of service (CPU consumption and network traffic amplification) via a crafted SCTP packet.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-solarisn/a
CWE ID-CWE-399
Not Available
CVE-2008-2058
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.80% / 73.12%
||
7 Day CHG~0.00%
Published-04 Jun, 2008 | 21:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-pix_security_applianceadaptive_security_appliance_softwaren/a
CWE ID-CWE-399
Not Available
CVE-2008-2092
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-8.94% / 92.25%
||
7 Day CHG~0.00%
Published-06 May, 2008 | 16:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linksys SPA-2102 Phone Adapter 3.3.6 allows remote attackers to cause a denial of service (crash) via a long ping packet ("ping of death"). NOTE: the severity of this issue has been disputed since there are limited attack scenarios.

Action-Not Available
Vendor-n/aLinksys Holdings, Inc.
Product-spa-2102_phone_adaptern/a
CWE ID-CWE-399
Not Available
CVE-2008-1852
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-3.35% / 86.82%
||
7 Day CHG~0.00%
Published-16 Apr, 2008 | 18:00
Updated-07 Aug, 2024 | 08:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, 7.53, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain requests that specify a large number of sub-arguments, which triggers a NULL pointer dereference due to memory allocation failure.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-399
Not Available
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found