Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CISCO >> CISCO IOS Timers Heap Buffer Overflow Vulnerability


Vulnerability Assessment Details

CISCO IOS Timers Heap Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Uses SNMP to determine if a flaw is present

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote router can be compromised remotely.

Description :

The remote host is a CISCO router containing a version of IOS which is
vulnerable to a heap overflow vulnerability.

A possible hacker may exploit this flaw to crash the remote device or to execute
arbitrary code remotely.

Solution :

http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml

Network Security Threat Level:

High / CVSS Base Score : 8
(AV:R/AC:H/Au:NR/C:C/A:C/I:C/B:I)

Networks Security ID: 15275

Vulnerability Assessment Copyright: This script is (C) 2005 Tenable Network Security

Cables, Connectors

Altair 8800 Card Guides (Reproduction - Black)
$33.5
Altair 8800 Card Guides (Reproduction - Black) pictureApple 1 Steve Jobs MITS Altair Intel 4004 IBM Mark 1 UNIVAC Cray-1 Babbage ENIAC
$36.0
Apple 1 Steve Jobs MITS Altair Intel 4004 IBM Mark 1 UNIVAC Cray-1 Babbage ENIAC pictureUNIVAC IBM 701 650 Apple 1, II Apple Lisa DEC PDP-8 Altair 8800 Computer History
$19.99
UNIVAC IBM 701 650 Apple 1, II Apple Lisa DEC PDP-8 Altair 8800 Computer History picture1976 COMPUTER NOTES Special Software Issue w/ Altair Mits Information *DAMAGED*
$19.99
1976 COMPUTER NOTES Special Software Issue w/ Altair Mits Information *DAMAGED* picture


Discussions

No Discussions have been posted on this vulnerability.