Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml | |
http://www.kb.cert.org/vuls/id/245190 | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16370 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-08-06 04:00
Updated : 2024-02-04 16:31
NVD link : CVE-2004-0551
Mitre link : CVE-2004-0551
CVE.ORG link : CVE-2004-0551
JSON object : View
Products Affected
cisco
- catalyst_2926gs
- catalyst_2926gl
- catalyst_6000_ws-svc-nam-2
- catalyst_4507r
- catalyst_4500
- catalyst_4506
- catalyst_2926f
- catos
- catalyst_6000_ws-x6380-nam
- catalyst_4000
- catalyst_4912g
- catalyst_4503
- catalyst_2980g
- catalyst_2948-ge-tx
- catalyst_2926
- catalyst_2902
- catalyst_2948g-l3
- catalyst_2901
- catalyst_5000
- catalyst_2926t
- catalyst_6000_ws-svc-nam-1
- catalyst_2980g-a
- catalyst_2948
- catalyst_4510r
CWE