CVE-2007-0918

The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*

History

21 Nov 2024, 00:27

Type Values Removed Values Added
References () http://osvdb.org/33053 - Broken Link () http://osvdb.org/33053 - Broken Link
References () http://secunia.com/advisories/24142 - Third Party Advisory () http://secunia.com/advisories/24142 - Third Party Advisory
References () http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml - Vendor Advisory () http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml - Vendor Advisory
References () http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html - Vendor Advisory () http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html - Vendor Advisory
References () http://www.securityfocus.com/bid/22549 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/22549 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1017631 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1017631 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/0597 - Permissions Required, Third Party Advisory () http://www.vupen.com/english/advisories/2007/0597 - Permissions Required, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32474 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/32474 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5832 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5832 - Broken Link

Information

Published : 2007-02-14 02:28

Updated : 2024-11-21 00:27


NVD link : CVE-2007-0918

Mitre link : CVE-2007-0918

CVE.ORG link : CVE-2007-0918


JSON object : View

Products Affected

cisco

  • ios