The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
References
Link | Resource |
---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml | Vendor Advisory |
http://www.securitytracker.com/id?1017631 | Broken Link Third Party Advisory VDB Entry |
http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html | Vendor Advisory |
http://www.securityfocus.com/bid/22549 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/24142 | Third Party Advisory |
http://osvdb.org/33053 | Broken Link |
http://www.vupen.com/english/advisories/2007/0597 | Permissions Required Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32474 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5832 | Broken Link |
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-02-13 18:28
Updated : 2022-06-02 10:09
NVD link : CVE-2007-0918
Mitre link : CVE-2007-0918
JSON object : View
CWE
Products Affected
cisco
- ios