Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4p29-f3rw-9cmg

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.

The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.

EPSS

Процентиль: 62%
0.00427
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 12 лет назад

The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.

CVSS3: 7.5
fstec
около 12 лет назад

Уязвимость операционной системы Cisco IOS, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 62%
0.00427
Низкий

Дефекты

CWE-119