Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/411332 | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5603 | signature vdb entry |
http://www.cert.org/advisories/CA-2003-17.html | patch exploit us government resource third party advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml | vendor advisory |
http://www.cert.org/advisories/CA-2003-15.html | patch third party advisory us government resource |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006743.html | mailing list |