Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections.
References
Configurations
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml - | |
References | () http://www.osvdb.org/1457 - | |
References | () http://www.securityfocus.com/bid/1454 - | |
References | () http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/4928 - |
07 Nov 2023, 01:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2000-03-20 05:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0613
Mitre link : CVE-2000-0613
CVE.ORG link : CVE-2000-0613
JSON object : View
Products Affected
cisco
- pix_firewall
CWE