First published: Wed Dec 01 2004(Updated: )
Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst 7600 Series | ||
Cisco 7600 Router | ||
Cisco 7200 | ||
Cisco 7500 Router | ||
Cisco 7300 Router | ||
Cisco IOS | =12.2\(14\)sz | |
Cisco IOS | =12.2\(18\)ew | |
Cisco IOS | =12.2\(18\)ewa | |
Cisco IOS | =12.2\(18\)s | |
Cisco IOS | =12.2\(18\)se | |
Cisco IOS | =12.2\(18\)sv | |
Cisco IOS | =12.2\(18\)sw | |
Cisco IOS | =12.2\(20\)ew | |
Cisco Multiservice Platform 2650XM | ||
Cisco Multiservice Platform 2650XM | ||
Cisco Multiservice Platform 2651 | ||
Cisco Multiservice Platform 2651XM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1111 has a medium severity rating as it can lead to a denial of service affecting network traffic.
To mitigate CVE-2004-1111, you can apply the "no service dhcp" command in the affected Cisco IOS configuration.
CVE-2004-1111 affects multiple Cisco IOS versions, including 12.2(14)SZ, 12.2(18)EW, and 12.2(18)SW among others.
Yes, CVE-2004-1111 can be exploited by remote attackers to cause denial of service.
The primary workaround for CVE-2004-1111 is to disable DHCP services on the affected Cisco devices.