The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
References
Link | Resource |
---|---|
http://osvdb.org/33053 | Broken Link |
http://secunia.com/advisories/24142 | Third Party Advisory |
http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml | Vendor Advisory |
http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html | Vendor Advisory |
http://www.securityfocus.com/bid/22549 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1017631 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2007/0597 | Permissions Required Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32474 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5832 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
02 Jun 2022, 17:09
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:h:cisco:ios:12.3yq:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3ys:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yg:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yz:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.4mr:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.4t:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3xq:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3xr:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yx:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.4:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3xx:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yd:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3xs:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.4xa:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.4xb:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3ym:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yk:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3ya:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3xy:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yh:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yj:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3yt:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:* |
References | (BID) http://www.securityfocus.com/bid/22549 - Third Party Advisory, VDB Entry | |
References | (MISC) http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html - Vendor Advisory | |
References | (OSVDB) http://osvdb.org/33053 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/32474 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/24142 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1017631 - Broken Link, Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5832 - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/0597 - Permissions Required, Third Party Advisory | |
References | (CISCO) http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml - Vendor Advisory |
Information
Published : 2007-02-14 02:28
Updated : 2024-02-04 17:13
NVD link : CVE-2007-0918
Mitre link : CVE-2007-0918
CVE.ORG link : CVE-2007-0918
JSON object : View
Products Affected
cisco
- ios
CWE