Логотип exploitDog
bind:CVE-2019-12654
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12654

Количество 3

Количество 3

nvd логотип

CVE-2019-12654

больше 6 лет назад

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-fg75-chcf-xjg7

больше 3 лет назад

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-03428

больше 6 лет назад

Уязвимость реализации протокола SIP (Session Initiation Protocol) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12654

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
github логотип
GHSA-fg75-chcf-xjg7

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03428

Уязвимость реализации протокола SIP (Session Initiation Protocol) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
1%
Низкий
больше 6 лет назад

Уязвимостей на страницу