what you don't know can hurt you
Showing 1 - 1 of 1 RSS Feed


Cisco Security Advisory 20100812-tcp
Posted Aug 13, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software Release, 15.1(2)T is affected by a denial of service (DoS) vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain in a SYNRCVD or SYNSENT state. Enough embryonic TCP connections in these states could consume system resources and prevent an affected device from accepting or initiating new TCP connections, including any TCP-based remote management access to the device. No authentication is required to exploit this vulnerability. An attacker does not need to complete a three-way handshake to trigger this vulnerability; therefore, this this vulnerability can be exploited using spoofed packets. This vulnerability may be triggered by normal network traffic.

tags | advisory, remote, denial of service, spoof, tcp
systems | cisco
advisories | CVE-2010-2827
MD5 | 1f26895382f88705b52f51a1ef625a1c
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By