ID CVE-2000-0486
Summary Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field.
References
Vulnerable Configurations
  • cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:tacacs\+:f4.0.2alpha:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:tacacs\+:f4.0.2alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:tacacs\+:f4.0.3alpha:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:tacacs\+:f4.0.3alpha:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 10-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 1293
bugtraq 20000530 An Analysis of the TACACS+ Protocol and its Implementations
confirm http://archives.neohapsis.com/archives/bugtraq/2000-05/0370.html
xf tacacsplus-packet-length-dos(4985)
Last major update 10-10-2017 - 01:29
Published 30-05-2000 - 04:00
Last modified 10-10-2017 - 01:29
Back to Top