Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml | |
http://www.kb.cert.org/vuls/id/245190 | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16370 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2004-06-15T04:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2004-06-11T00:00:00
Link: CVE-2004-0551
JSON object: View
NVD Information
Status : Modified
Published: 2004-08-06T04:00:00.000
Modified: 2017-07-11T01:30:15.323
Link: CVE-2004-0551
JSON object: View
Redhat Information
No data.
CWE