Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.
References
Link | Resource |
---|---|
http://secunia.com/advisories/40843 | Vendor Advisory |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | Patch Vendor Advisory |
http://secunia.com/advisories/40843 | Vendor Advisory |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/40843 - Vendor Advisory | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml - Patch, Vendor Advisory |
Information
Published : 2010-08-09 11:58
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2821
Mitre link : CVE-2010-2821
CVE.ORG link : CVE-2010-2821
JSON object : View
Products Affected
cisco
- firewall_services_module
- catalyst_7600
- firewall_services_module_software
- catalyst_6500
CWE