The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/33749 - | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/33608 - | |
References | () http://www.securitytracker.com/id?1021679 - |
Information
Published : 2009-02-05 00:30
Updated : 2024-11-21 00:58
NVD link : CVE-2009-0059
Mitre link : CVE-2009-0059
CVE.ORG link : CVE-2009-0059
JSON object : View
Products Affected
cisco
- catalyst_3750_series_integrated_wireless_lan_controller
- 4400_wireless_lan_controller
- catalyst_7600_series_wireless_lan_controller
- wireless_lan_controller_software
- catalyst_6500_series_integrated_wireless_lan_controller
CWE
CWE-20
Improper Input Validation