The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/34438Â - Vendor Advisory | |
References | () http://securitytracker.com/id?1021897Â - | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml - Vendor Advisory | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/34242Â - | |
References | () http://www.vupen.com/english/advisories/2009/0851Â - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/49418Â - |
Information
Published : 2009-03-27 16:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0630
Mitre link : CVE-2009-0630
CVE.ORG link : CVE-2009-0630
JSON object : View
Products Affected
cisco
- ios
CWE