ID CVE-2005-0599
Summary Cisco devices running Application and Content Networking System (ACNS) 4.x, 5.0, or 5.1 before 5.1.11.6 allow remote attackers to cause a denial of service (CPU consumption) via malformed IP packets.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:-:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:-:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:4.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:4.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.11.6:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.11.6:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.17.5:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.17.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.0.17.6:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.0.17.6:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:application_and_content_networking_software:5.1.11.5:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:application_and_content_networking_software:5.1.11.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 12648
cisco 20050224 ACNS Denial of Service and Default Admin Password Vulnerabilities
secunia 14395
xf cisco-ip-packet-dos(19468)
Last major update 11-07-2017 - 01:32
Published 02-05-2005 - 04:00
Last modified 11-07-2017 - 01:32
Back to Top