CVE-2000-0984 : Détail

CVE-2000-0984

0.04%V3
Network
2001-01-22
04h00 +00:00
2009-03-01
23h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The HTTP server in Cisco IOS 12.0 through 12.1 allows local users to cause a denial of service (crash and reload) via a URL containing a "?/" string.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 20323

Date de publication : 2000-10-24 22h00 +00:00
Auteur : Alberto Solino
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/1838/info Cisco devices running IOS software may be prone to a denial of service attack if a URL containing a question mark followed by a slash (?/) is requested. The device will enter an infinite loop when supplied with a URL containing a "?/" and an enable password. Subsequently, the router will crash in two minutes after the watchdog timer has expired and will then reload. In certain cases, the device will not reload and a restart would be required in order to regain normal functionality. This vulnerability is restricted to devices that do not have the enable password set or if the password is known or can be easily predicted. The vulnerable service is only on by default in the Cisco 1003, 1004 and 1005 routers. Users can identify vulnerable or invulnerable devices running IOS by logging onto the device and issuing the ?show version? command. If IOS is running on a vulnerable device the command will return ?Internetwork Operating System Software? or ?IOS (tm)? with a version number. Vulnerable IOS software may be found on the following Cisco devices: *Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, ubr900, 1000, 1400, 1500, 1600, 1700, 2500, 2600, 3000, 3600, 3800, 4000, 4500, 4700, AS5200, AS5300, AS5800, 6400, 7000, 7200, ubr7200, 7500, and 12000 series. *Recent versions of LS1010 ATM switch. *Catalyst 6000 with IOS. *Catalyst 2900XL LAN switch with IOS. *Cisco DistributedDirector. http://target/anytext?/

Products Mentioned

Configuraton 0

Cisco>>Ios >> Version 12.0t

Cisco>>Ios >> Version 12.0w5

Cisco>>Ios >> Version 12.0xa

Cisco>>Ios >> Version 12.0xe

Cisco>>Ios >> Version 12.0xh

Cisco>>Ios >> Version 12.0xj

Cisco>>Ios >> Version 12.1aa

Cisco>>Ios >> Version 12.1da

Cisco>>Ios >> Version 12.1db

Cisco>>Ios >> Version 12.1dc

Cisco>>Ios >> Version 12.1ec

Cisco>>Ios >> Version 12.1t

Cisco>>Ios >> Version 12.1xa

Cisco>>Ios >> Version 12.1xb

Cisco>>Ios >> Version 12.1xc

Cisco>>Ios >> Version 12.1xd

Cisco>>Ios >> Version 12.1xe

Cisco>>Ios >> Version 12.1xf

Cisco>>Ios >> Version 12.1xg

Cisco>>Ios >> Version 12.1xh

Cisco>>Ios >> Version 12.1xi

Cisco>>Ios >> Version 12.1xj

Cisco>>Ios >> Version 12.1xl

Cisco>>Ios >> Version 12.1xp

Références

http://www.securityfocus.com/bid/1838
Tags : vdb-entry, x_refsource_BID