First published: Mon Jan 11 1999(Updated: )
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.0\(1\)w | |
Cisco IOS | =12.0\(1\)xb | |
Cisco IOS | =12.0\(2\)xd | |
Cisco IOS | =12.0t | |
Cisco IOS | =12.0\(1\)xe | |
Cisco IOS | =11.3db | |
Cisco IOS | =12.0db | |
Cisco IOS | =11.3aa | |
Cisco IOS | =12.0\(1\)xa3 | |
Cisco IOS | =12.0\(2\)xc | |
Cisco IOS | =12.0s | |
Cisco IOS | =12.0 | |
=11.3aa | ||
=11.3db | ||
=12.0 | ||
=12.0\(1\)w | ||
=12.0\(1\)xa3 | ||
=12.0\(1\)xb | ||
=12.0\(1\)xe | ||
=12.0\(2\)xc | ||
=12.0\(2\)xd | ||
=12.0db | ||
=12.0s | ||
=12.0t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0063 is considered a critical vulnerability that can crash affected Cisco IOS systems.
To fix CVE-1999-0063, update your Cisco IOS to a version that addresses this vulnerability.
CVE-1999-0063 affects various versions of Cisco IOS including 12.0, 11.3aa, and 11.3db.
CVE-1999-0063 can be exploited through malicious UDP packets sent to the syslog port.
To mitigate CVE-1999-0063, consider disabling the syslog service or implementing access control measures.