First published: Tue Dec 31 2002(Updated: )
Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =5.2 | |
Cisco PIX Firewall | =5.2\(8\) | |
Cisco PIX Firewall | =6.0\(1\) | |
Cisco PIX Firewall | =6.0\(2\) | |
Cisco PIX Firewall | =6.2 | |
Cisco PIX Firewall | =5.2\(1\) | |
Cisco PIX Firewall | =5.2\(2\) | |
Cisco PIX Firewall | =5.2\(3\) | |
Cisco PIX Firewall | =5.2\(4\) | |
Cisco PIX Firewall | =5.2\(6\) | |
Cisco PIX Firewall | =6.0 | |
Cisco PIX Firewall | =6.0\(3\) | |
Cisco PIX Firewall | =6.1 | |
Cisco PIX Firewall | =6.1\(2\) | |
Cisco PIX Firewall | =5.2\(5\) | |
Cisco PIX Firewall | =5.2\(7\) | |
Cisco PIX Firewall | =6.1\(1\) | |
Cisco PIX Firewall | =6.1\(3\) | |
Cisco PIX Firewall | =6.2\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2140 is classified as a high severity vulnerability that can lead to remote denial of service.
To fix CVE-2002-2140, upgrade your Cisco PIX Firewall software to a version that is not affected by this vulnerability.
CVE-2002-2140 affects Cisco PIX Firewall versions 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1.
Yes, CVE-2002-2140 can be exploited by remote attackers through crafted HTTP traffic authentication.
CVE-2002-2140 specifically affects TACACS+ and RADIUS authentication protocols.