Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-2049
Modified
More InfoOfficial Page
Source-ykramarz@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-30 Jul, 2009 | 18:30
Updated At-29 Sep, 2017 | 01:34

Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.4MEDIUM
AV:N/AC:H/Au:N/C:N/I:N/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>ios>>12.0\(32\)s12
cpe:2.3:o:cisco:ios:12.0\(32\)s12:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0\(32\)s13
cpe:2.3:o:cisco:ios:12.0\(32\)s13:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0\(32\)sy8
cpe:2.3:o:cisco:ios:12.0\(32\)sy8:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0\(32\)sy9
cpe:2.3:o:cisco:ios:12.0\(32\)sy9:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0\(33\)s3
cpe:2.3:o:cisco:ios:12.0\(33\)s3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0\(33\)s4
cpe:2.3:o:cisco:ios:12.0\(33\)s4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxi1
cpe:2.3:o:cisco:ios:12.2\(33\)sxi1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxi2
cpe:2.3:o:cisco:ios:12.2\(33\)sxi2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2xnc
cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2xnd
cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.4\(24\)t1
cpe:2.3:o:cisco:ios:12.4\(24\)t1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>2.3
cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>2.3.1t
cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>2.4
cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>2.4.0
cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-16Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/36046ykramarz@cisco.com
N/A
http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtmlykramarz@cisco.com
Patch
Vendor Advisory
http://www.securityfocus.com/bid/35860ykramarz@cisco.com
N/A
http://www.securitytracker.com/id?1022619ykramarz@cisco.com
N/A
http://www.vupen.com/english/advisories/2009/2082ykramarz@cisco.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853ykramarz@cisco.com
N/A
Change History
0Changes found

Details not found