First published: Sun Feb 06 2005(Updated: )
Cisco IOS 12.0S through 12.3YH allows remote attackers to cause a denial of service (device restart) via a crafted IPv6 packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =12.0s | |
Puppet Cisco IOS | =12.0sx | |
Puppet Cisco IOS | =12.0sz | |
Puppet Cisco IOS | =12.2b | |
Puppet Cisco IOS | =12.2bc | |
Puppet Cisco IOS | =12.2bx | |
Puppet Cisco IOS | =12.2bz | |
Puppet Cisco IOS | =12.2cx | |
Puppet Cisco IOS | =12.2cz | |
Puppet Cisco IOS | =12.2ew | |
Puppet Cisco IOS | =12.2ewa | |
Puppet Cisco IOS | =12.2jk | |
Puppet Cisco IOS | =12.2mc | |
Puppet Cisco IOS | =12.2s | |
Puppet Cisco IOS | =12.2se | |
Puppet Cisco IOS | =12.2su | |
Puppet Cisco IOS | =12.2sv | |
Puppet Cisco IOS | =12.2sw | |
Puppet Cisco IOS | =12.2sx | |
Puppet Cisco IOS | =12.2sxa | |
Puppet Cisco IOS | =12.2sxb | |
Puppet Cisco IOS | =12.2sxd | |
Puppet Cisco IOS | =12.2sy | |
Puppet Cisco IOS | =12.2sz | |
Puppet Cisco IOS | =12.2t | |
Puppet Cisco IOS | =12.2yt | |
Puppet Cisco IOS | =12.2yu | |
Puppet Cisco IOS | =12.2yv | |
Puppet Cisco IOS | =12.2yz | |
Puppet Cisco IOS | =12.2zc | |
Puppet Cisco IOS | =12.2zd | |
Puppet Cisco IOS | =12.2ze | |
Puppet Cisco IOS | =12.2zf | |
Puppet Cisco IOS | =12.2zg | |
Puppet Cisco IOS | =12.2zh | |
Puppet Cisco IOS | =12.2zi | |
Puppet Cisco IOS | =12.2zj | |
Puppet Cisco IOS | =12.2zl | |
Puppet Cisco IOS | =12.2zn | |
Puppet Cisco IOS | =12.2zo | |
Puppet Cisco IOS | =12.2zp | |
Puppet Cisco IOS | =12.3 | |
Puppet Cisco IOS | =12.3b | |
Puppet Cisco IOS | =12.3bc | |
Puppet Cisco IOS | =12.3bw | |
Puppet Cisco IOS | =12.3j | |
Puppet Cisco IOS | =12.3ja | |
Puppet Cisco IOS | =12.3t | |
Puppet Cisco IOS | =12.3xa | |
Puppet Cisco IOS | =12.3xb | |
Puppet Cisco IOS | =12.3xc | |
Puppet Cisco IOS | =12.3xd | |
Puppet Cisco IOS | =12.3xe | |
Puppet Cisco IOS | =12.3xf | |
Puppet Cisco IOS | =12.3xg | |
Puppet Cisco IOS | =12.3xh | |
Puppet Cisco IOS | =12.3xi | |
Puppet Cisco IOS | =12.3xk | |
Puppet Cisco IOS | =12.3xl | |
Puppet Cisco IOS | =12.3xm | |
Puppet Cisco IOS | =12.3xn | |
Puppet Cisco IOS | =12.3xq | |
Puppet Cisco IOS | =12.3xr | |
Puppet Cisco IOS | =12.3xs | |
Puppet Cisco IOS | =12.3xt | |
Puppet Cisco IOS | =12.3xu | |
Puppet Cisco IOS | =12.3xw | |
Puppet Cisco IOS | =12.3xx | |
Puppet Cisco IOS | =12.3xy | |
Puppet Cisco IOS | =12.3xz | |
Puppet Cisco IOS | =12.3ya | |
Puppet Cisco IOS | =12.3yd | |
Puppet Cisco IOS | =12.3ye | |
Puppet Cisco IOS | =12.3yf | |
Puppet Cisco IOS | =12.3yg | |
Puppet Cisco IOS | =12.3yh |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0195 is classified as a high-severity vulnerability due to its potential to cause a denial of service by forcing a device restart.
To mitigate CVE-2005-0195, you should upgrade to a non-vulnerable version of Cisco IOS, as specified in the vendor's release notes.
CVE-2005-0195 affects various versions of Cisco IOS 12.0S through 12.3YH, including specific versions listed in the vulnerability details.
CVE-2005-0195 exploits a vulnerability in how Cisco IOS handles crafted IPv6 packets, leading to a system restart.
While CVE-2005-0195 does not allow remote code execution, it can disrupt network availability by causing device restarts.