7.5
CWE
NVD-CWE-Other 119
Advisory Published
CVE Published
Updated

CVE-2003-0100: Buffer Overflow

First published: Mon Mar 03 2003(Updated: )

Buffer overflow in Cisco IOS 11.2.x to 12.0.x allows remote attackers to cause a denial of service and possibly execute commands via a large number of OSPF neighbor announcements.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Cisco IOS=12.0\(16\)sc3
Cisco IOS=11.2xa
Cisco IOS=11.3\(11b\)
Cisco IOS=12.0\(8\)s1
Cisco IOS=12.0xc
Cisco IOS=11.3xa
Cisco IOS=12.0xk
Cisco IOS=12.0xr
Cisco IOS=11.2\(4\)f
Cisco IOS=11.1\(36\)ca2
Cisco IOS=11.1ct
Cisco IOS=11.2f
Cisco IOS=12.0\(16.06\)s
Cisco IOS=12.0st
Cisco IOS=12.0\(5\)t1
Cisco IOS=12.0\(9\)
Cisco IOS=12.0xq
Cisco IOS=12.0\(13\)wt6\(1\)
Cisco IOS=12.0\(15\)s3
Cisco IOS=12.0\(16a\)
Cisco IOS=12.0\(18\)s5
Cisco IOS=12.0\(5\)wc3
Cisco IOS=11.3ma
Cisco IOS=12.0\(5\)yb4
Cisco IOS=12.0\(7\)sc
Cisco IOS=12.0dc
Cisco IOS=12.0xe
Cisco IOS=11.1\(15\)ca
Cisco IOS=11.3na
Cisco IOS=12.0\(1\)xb
Cisco IOS=11.1\(13\)
Cisco IOS=11.1\(16\)aa
Cisco IOS=11.2\(4\)xaf
Cisco IOS=11.2bc
Cisco IOS=12.0\(17a\)
Cisco IOS=12.0\(2\)xd
Cisco IOS=12.0\(5\)xk2
Cisco IOS=12.0\(5.3\)wc1
Cisco IOS=12.0\(7.4\)s
Cisco IOS=12.0\(9\)s
Cisco IOS=12.0\(9\)s8
Cisco IOS=12.0xj
Cisco IOS=12.0xs
Cisco IOS=12.0\(16\)st1
Cisco IOS=12.0\(2\)
Cisco IOS=11.1ia
Cisco IOS=11.2\(8\)p
Cisco IOS=11.2\(8\)sa3
Cisco IOS=11.3da
Cisco IOS=12.0\(7\)db2
Cisco IOS=12.0\(9a\)
Cisco IOS=12.0xd
Cisco IOS=12.0xl
Cisco IOS=11.1\(13\)ia
Cisco IOS=11.1\(15\)aa
Cisco IOS=11.1\(20\)aa4
Cisco IOS=12.0\(1\)w
Cisco IOS=12.0\(14\)s7
Cisco IOS=12.0\(16\)s8
Cisco IOS=12.0\(4\)xm
Cisco IOS=12.0\(7\)xk
Cisco IOS=12.0\(8.0.2\)s
Cisco IOS=12.0\(8.3\)sc
Cisco IOS=11.1\(15\)ia
Cisco IOS=11.1\(24b\)
Cisco IOS=11.1ca
Cisco IOS=11.2\(19\)gs0.2
Cisco IOS=11.2\(4\)f1
Cisco IOS=11.2wa4
Cisco IOS=12.0\(1\)xe
Cisco IOS=12.0\(11\)st4
Cisco IOS=11.1cc
Cisco IOS=11.3
Cisco IOS=11.3\(1\)ed
Cisco IOS=11.3\(7\)db1
Cisco IOS=12.0\(10\)s7
Cisco IOS=12.0\(10\)w5
Cisco IOS=12.0\(12a\)
Cisco IOS=12.0\(14\)w5\(20\)
Cisco IOS=12.0\(14a\)
Cisco IOS=12.0\(16\)w5\(21\)
Cisco IOS=12.0\(3d\)
Cisco IOS=12.0\(5.4\)wc1
Cisco IOS=12.0\(7a\)
Cisco IOS=12.0xa
Cisco IOS=12.0xb
Cisco IOS=12.0xu
Cisco IOS=12.0\(14\)st3
Cisco IOS=12.0\(17\)sl2
Cisco IOS=12.0\(3\)
Cisco IOS=12.0\(5\)xe
Cisco IOS=12.0\(5.2\)xu
Cisco IOS=12.0\(7\)t
Cisco IOS=12.0\(7\)t2
Cisco IOS=12.0\(7\)xk3
Cisco IOS=12.0\(7\)xv
Cisco IOS=12.0\(8a\)
Cisco IOS=12.0sc
Cisco IOS=12.0sl
Cisco IOS=12.0xh
Cisco IOS=11.1\(13\)ca
Cisco IOS=11.1\(17\)cc
Cisco IOS=11.2
Cisco IOS=11.2\(26a\)
Cisco IOS=11.2\(8\)sa1
Cisco IOS=11.2p
Cisco IOS=11.3aa
Cisco IOS=11.3db
Cisco IOS=12.0\(1\)
Cisco IOS=12.0\(10\)w5\(18f\)
Cisco IOS=12.0\(10\)w5\(18g\)
Cisco IOS=12.0\(13\)w5\(19c\)
Cisco IOS=12.0\(17\)
Cisco IOS=12.0\(2\)xf
Cisco IOS=12.0\(4\)xe
Cisco IOS=12.0\(6b\)
Cisco IOS=12.0\(7\)dc1
Cisco IOS=12.0\(7\)xf
Cisco IOS=12.0db
Cisco IOS=12.0t
Cisco IOS=11.1\(7\)aa
Cisco IOS=11.1\(7\)ca
Cisco IOS=11.1\(9\)ia
Cisco IOS=11.2\(26b\)
Cisco IOS=11.2\(4\)
Cisco IOS=11.2sa
Cisco IOS=11.3\(11b\)t2
Cisco IOS=12.0\(10a\)
Cisco IOS=12.0\(15a\)
Cisco IOS=12.0\(18\)st1
Cisco IOS=12.0\(2\)xg
Cisco IOS=12.0\(4\)xe1
Cisco IOS=12.0\(7\)s1
Cisco IOS=12.0\(7\)xf1
Cisco IOS=12.0w5
Cisco IOS=11.1\(28a\)ct
Cisco IOS=11.1aa
Cisco IOS=11.2\(17\)
Cisco IOS=11.2\(9\)p
Cisco IOS=11.2\(9\)xa
Cisco IOS=11.3\(11c\)
Cisco IOS=11.3\(2\)xa
Cisco IOS=11.3t
Cisco IOS=12.0\(11a\)
Cisco IOS=12.0\(14\)st
Cisco IOS=11.1
Cisco IOS=11.1\(16\)ia
Cisco IOS=11.1\(28a\)ia
Cisco IOS=11.2\(19a\)gs6
Cisco IOS=11.2\(23a\)bc1
Cisco IOS=11.2\(4\)xa
Cisco IOS=11.3\(8\)db2
Cisco IOS=11.3wa4
Cisco IOS=12.0\(12\)s3
Cisco IOS=12.0\(13\)s6
Cisco IOS=12.0\(17\)st5
Cisco IOS=12.0\(2\)xc
Cisco IOS=12.0\(4\)s
Cisco IOS=12.0\(5\)wc
Cisco IOS=12.0\(5\)wc2
Cisco IOS=12.0\(5\)xn
Cisco IOS=12.0\(7\)wx5\(15a\)
Cisco IOS=12.0\(7\)xe
Cisco IOS=12.0sp
Cisco IOS=12.0xi
Cisco IOS=12.0\(17\)sl6
Cisco IOS=12.0\(17\)st1
Cisco IOS=12.0\(18b\)
Cisco IOS=12.0\(3\)t2
Cisco IOS=12.0\(5\)t
Cisco IOS=12.0\(5\)xk
Cisco IOS=12.0\(5.1\)xp
Cisco IOS=12.0wt
Cisco IOS=12.0wx
Cisco IOS=12.0xg
Cisco IOS=11.1\(13\)aa
Cisco IOS=11.1\(17\)ct
Cisco IOS=11.1\(36\)cc2
Cisco IOS=11.1\(36\)cc4
Cisco IOS=11.2\(26\)p2
Cisco IOS=11.2gs
Cisco IOS=11.3\(1\)t
Cisco IOS=11.3\(11\)b
Cisco IOS=12.0
Cisco IOS=12.0\(15\)s6
Cisco IOS=12.0\(18\)s
Cisco IOS=12.0\(2\)xe
Cisco IOS=12.0\(4\)t
Cisco IOS=12.0\(5\)wc2b
Cisco IOS=12.0\(5\)xn1
Cisco IOS=12.0\(5\)xs
Cisco IOS=12.0\(7\)xe2
Cisco IOS=12.0\(8\)
Cisco IOS=12.0da
Cisco IOS=12.0sx
Cisco IOS=12.0xm
Cisco IOS=12.0xv
Cisco IOS=12.0xw
Cisco IOS=11.1\(24a\)
Cisco IOS=11.2\(10\)bc
Cisco IOS=11.2\(11b\)t2
Cisco IOS=11.2\(8\)sa5
Cisco IOS=11.2\(8.9\)sa6
Cisco IOS=11.2wa3
Cisco IOS=11.3ha
Cisco IOS=12.0\(1\)xa3
Cisco IOS=12.0\(11\)s6
Cisco IOS=12.0\(13a\)
Cisco IOS=12.0\(17\)s
Cisco IOS=12.0\(17\)s4
Cisco IOS=12.0\(18\)w5\(22b\)
Cisco IOS=12.0\(2b\)
Cisco IOS=12.0\(4\)xm1
Cisco IOS=12.0\(5\)wc3b
Cisco IOS=12.0\(5\)wx
Cisco IOS=12.0\(5\)xu
Cisco IOS=12.0s
Cisco IOS=12.0wc
Cisco IOS=12.0xf
Cisco IOS=12.0xn
Cisco IOS=12.0xp

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2003-0100?

    The severity of CVE-2003-0100 is considered high due to the potential denial of service and remote execution of commands.

  • How do I fix CVE-2003-0100?

    To fix CVE-2003-0100, update the affected Cisco IOS versions to a patched release recommended by Cisco.

  • What are the affected versions in CVE-2003-0100?

    CVE-2003-0100 affects Cisco IOS versions from 11.2.x to 12.0.x, including specific releases listed in the vulnerability report.

  • Can CVE-2003-0100 be exploited remotely?

    Yes, CVE-2003-0100 can be exploited remotely through a large number of OSPF neighbor announcements.

  • What type of vulnerability is CVE-2003-0100?

    CVE-2003-0100 is a buffer overflow vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203