Cisco ACNS software prior to 4.2.11 or 5.0.5 contain a remotely exploitable buffer overflow which is triggered by a long password. Affected devices include Content Routers 4400 series, Content Distribution Manager 4600 series, Content Engine 500 and 7300 series, and Content Engine Module for Cisco Routers 2600, 3600 and 3700 series. Workaround is to disable the CE GUI with the command "no gui-server enable".
e1fbc10f5a4b3db1525b14117a3a9d796203a1de05f9e836b730be2377f7e173
Cisco Security Advisory 20031202 - Cisco Aironet Access Points (AP) running Cisco IOS software will send any static Wired Equivalent Privacy (WEP) key in the cleartext to the Simple Network Management Protocol (SNMP) server if the snmp-server enable traps wlan-wep command is enabled. Cisco Aironet 1100, 1200, and 1400 series are affected, but the command is disabled by default.
705c85418950584e704df182238699f65f51cad8b32f80e8a6784bbcd4f5c02c
The Cisco VPN 5000 clients for Linux and Solaris contain buffer overflow vulnerabilities that can be used by local users to execute machine code with root privileges.
ef73a328b8f9b09032f81940611868f3dd493833dfba7deb4c0654cc3058b521
The Cisco VPN3000 gateway lets remote client dictate which maximum MTU to use when sending back ESP frames, regardless of the transmitting capabilities of the physical medium. This can lead to denial of service conditions.
c02c5efceb3de66f0063f72ec5186d0b3d0fd4ffbf6f7b6b4cc5f61471cc7661
Cisco Security Advisory - Exploitation of the CRC 32 overflow can cause some Cisco devices to reboot. This vulnerability affects all devices running Cisco IOS Software supporting SSH, Cisco Catalyst 6000 switches running CatOS, Cisco PIX Firewall's and the Cisco 11000 Content Service Switch family.
7befb772887fb4fbb686ea46e89b6ea2c5cd7769a112f37ab6d6e77efa35498f
Cisco Security Advisory - A buffer overflow in the Cisco VPN Clients for Linux, Solaris, and Mac OS X platforms can be exploited locally to gain local root access. This is fixed in v3.5.2.
ef73a328b8f9b09032f81940611868f3dd493833dfba7deb4c0654cc3058b521
Cisco Security Advisory - A vulnerability found in the web interface that comes with the Cisco ATA 186 Analog Telephone Adaptor be used to remotely disclose passwords by retrieving the router config via a specially crafted POST request.
055867c0b6b1881f66a086900cbd9d16bf99338974b67736d20018ad873f9255
Cisco Security Advisory - Three new denial of service vulnerabilities involving large packets have been found in Cisco routers that are running the CBOS software. This affects the following Cisco devices: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678.
90f3170e3df5235aeed1ca9f10ff1951dc46a2724378626d35c4f953ce6b98bc
Cisco Security Advisory - Multiple Vulnerabilities in Cisco IP Telephones. Bugs found in the Cisco IP Telephones can result in denial of service conditions and allow unauthorized access to the configuration settings of the Cisco IP Phone models 7910, 7940, and 7960.
dd0911b414f95a26e4d9aee568de32cb04390ea61ff26de79b9c52d60d61fa83
Cisco Security Advisory - The Cisco Content Service Switch (CSS) 11000 series switches are susceptible to a denial of service attack caused by a soft reset due to improper handling of HTTP POST requests to the web management interface.
e29943737ca226061c14b1b2491f2630dacbeff69249ba2082bc21be47222621
Cisco Security Advisory - Cisco Cache Engines and Content Engines provide a transparent cache for world wide web pages retrieved via HTTP. The default configuration of the proxy feature can be abused to open a TCP connection to any reachable destination IP address and hide the true IP source address of the connection allowing for anonymous port scanning, dos attacks, spam, etc.
90dda9032936ddaa76e20df2b74ee75c7232797f81c592acdd20f58b6db84f78
The Cisco UBR 900 series routers allow remote users snmp read access with any community string.
9bd0f26ff7a2fc4740da643357c7a9d680e9716d015dce7ba90644ab12c220b7
Cisco Security Advisory - A vulnerability causing performance degradation on Cisco 12000 series routers when receiving large numbers of ICMP Unreachable packets has been discovered.
fe7c00cd3df79c1ae19df496e96fe051f1aebb0999c1da2d79c74de18dd1c1fb
Cisco Security Advisory - Six vulnerabilities involving ACLs have been discovered in multiple releases of Cisco IOSR Software Release for Cisco 12000 Series Internet Routers.
94294beedb28664c3fa538762316825bac55a830b1d579d0c5291ff25c661d30
Cisco Security Advisory - The Cisco Secure PIX firewall feature "mailguard" which limits SMTP commands to a specified minimum set of commands can be bypassed. To exploit this vulnerability, attackers must be able to make connections to an SMTP mail server protected by the PIX Firewall. All users of Cisco Secure PIX Firewalls with software versions 6.0(1), 5.2(5) and 5.2(4) that provide access to SMTP Mail services are at risk.
844d365f0b47bcd0fed7bc74723706ea4c035e7ea51e5d953adcdb2706897b20
Cisco Security Advisory - Vulnerabilities in Cisco SN 5420 Storage Routers. Two vulnerabilities have been discovered in Cisco SN 5420 Storage Router software release up to and including 1.1(3). One of the vulnerabilities can cause Denial-of-Service attack. The other allows unrestricted low level access to the SN 5420. The vulnerabilities are exploited via TCP ports 514 and 8023.
1afc76ae5c67cd4b32febcfd4b2c0a11ec83ff017303afaec985ba49773f15b2
Cisco Security Advisory - Many IOS and CatOS releases contain several independent but related vulnerabilities involving the unexpected creation and exposure of SNMP community strings. These vulnerabilities can be exploited to permit the unauthorized viewing or modification of affected devices. To fix, install the free upgrade or block UDP port 161.
1a553bc9b32c2682597b80da1cf16f0ec9cbf9029a6a1ac3286ac73e4b2d0719
Cisco Security Advisory - Catalyst Memory Leak Vulnerability. A series of failed telnet authentication attempts to the switch can cause the Catalyst Switch to fail to pass traffic or accept management connections until the system is rebooted or a power cycle is performed. All types of telnet authentication are affected, including Kerberized telnet, and AAA authentication.
f78e1da717f41cb8bc980acf491fc47ff430a1f0ad3b5d1aa403d9b8a3328338
Cisco Advisory - The Cisco Secure PIX firewall feature "mailguard," which limits SMTP commands to a specified minimum set of commands, can be bypassed. This vulnerability can be exploited to bypass SMTP command filtering. All users of Cisco Secure PIX Firewalls with software versions up to and including 4.4(5), 5.0(3), 5.1(2) and 5.2(1) that provide access to SMTP Mail services are at risk. The IOS Firewall featureset is not affected by either of the above defects.
3fd96653c343f5d7653e249d522f740519cd8396a9f30cc652f351a0e895f840
Cisco Security Advisory - This advisory highlights three vulnerabilities found in the CiscoSecure Access Control Server for Windows NT. The first bug is a buffer overflow in the CSAdmin module that allows a malicious user to execute arbitrary code or crash the module by sending an oversized packet to TCP port 2002. The second vulnerability involves sending an oversized TACACS+ packet to the CiscoSecure ACS thereby creating an unstable condition within the system conducive to denial of service attacks. Lastly, the enable password can be bypassed to gain unauthorized access to a router or switch if the interaction is between an LDAP server that allows null passwords and a CiscoSecure ACS for Windows NT. All releases of CiscoSecure ACS for Windows NT Server up to and including 2.1(x), 2.3(3), and 2.4(2) are vulnerable. CiscoSecure ACS for UNIX is not affected.
c230ea8e43185ba2ece9c31b2ac308f4498d45ee881a3a4a2f35e0351d9bdc5f
Cisco Security Advisory - A defect in Cisco IOS Software running on all models of Gigabit Switch Routers (GSRs) configured with Gigabit Ethernet or Fast Ethernet cards may cause packets to be forwarded without correctly evaluating configured access control lists (ACLs). In addition to circumventing the access control lists, it is possible to stop an interface from forwarding any packets, thus causing a denial of service. There is no workaround - Customers are urged to upgrade to unaffected versions of software as soon as possible.
02da0f467757fcd1b9bc52782005ef8afe62885b2d7120986017efd8613bc337
Cisco Secure PIX Firewall TCP Reset Vulnerability - The Cisco Secure PIX Firewall cannot distinguish between a forged TCP Reset (RST) packet and a genuine TCP RST packet because the sequence number is not checked. Any TCP/IP connection established through the Cisco Secure PIX Firewall can be terminated by a third party from the untrusted network if the connection can be uniquely determined. If only source ip / destination ip / destination port are known, a RST packet can be sent with each source port.
b1f7eb96541775acb267d750a7136e421f2b6437fb5e1dadef4de9c99dc843d6
Cisco Security Advisory: Cisco IOS Software TELNET Option Handling Vulnerability. A defect in multiple Cisco IOS software versions will cause a Cisco router to reload unexpectedly when the router is tested for security vulnerabilities by security scanning software programs. The defect can be exploited repeatedly to produce a consistent denial of service (DoS) attack. Vulnerable releases include 11.3AA, 12.0(2) up to and including 12.0(6), and 12.0(7).
c2a046bca26844dbd75fc3680a4d278a190f831a1a15035f2023514a4fc60462
Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability. Cisco Catalyst software permits unauthorized access to the enable mode in the 5.4(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password.
2d3c392effc4cfb5fa8f42000720057f1235a6fe463f1b5a07f2fc28ba873093
The Cisco Secure PIX Firewall interprets FTP (File Transfer Protocol) commands out of context and inappropriately opens temporary access through the firewall. This is an interim notice describing two related vulnerabilities.
d9dd5eea66870d2029e813abe94d615ab12458e3e984c0e779c9e025f32d89b2