7.1
CWE
399
Advisory Published
Updated

CVE-2005-1021

First published: Sat Apr 09 2005(Updated: )

Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 through 12.3, when authenticating against a TACACS+ server, allows remote attackers to cause a denial of service (memory consumption) via an incorrect username or password.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=12.0s
Puppet Cisco IOS=12.0sx
Puppet Cisco IOS=12.1ax
Puppet Cisco IOS=12.1az
Puppet Cisco IOS=12.1db
Puppet Cisco IOS=12.1dc
Puppet Cisco IOS=12.1e
Puppet Cisco IOS=12.1ea
Puppet Cisco IOS=12.1eb
Puppet Cisco IOS=12.1ec
Puppet Cisco IOS=12.1eu
Puppet Cisco IOS=12.1ew
Puppet Cisco IOS=12.1ex
Puppet Cisco IOS=12.1t
Puppet Cisco IOS=12.1xd
Puppet Cisco IOS=12.1xe
Puppet Cisco IOS=12.1xf
Puppet Cisco IOS=12.1xg
Puppet Cisco IOS=12.1xh
Puppet Cisco IOS=12.1xi
Puppet Cisco IOS=12.1xl
Puppet Cisco IOS=12.1xm
Puppet Cisco IOS=12.1xp
Puppet Cisco IOS=12.1xq
Puppet Cisco IOS=12.1xr
Puppet Cisco IOS=12.1xt
Puppet Cisco IOS=12.1xu
Puppet Cisco IOS=12.1xv
Puppet Cisco IOS=12.1ya
Puppet Cisco IOS=12.1yb
Puppet Cisco IOS=12.1yc
Puppet Cisco IOS=12.1yd
Puppet Cisco IOS=12.1ye
Puppet Cisco IOS=12.1yf
Puppet Cisco IOS=12.1yh
Puppet Cisco IOS=12.1yi
Puppet Cisco IOS=12.2
Puppet Cisco IOS=12.2b
Puppet Cisco IOS=12.2dd
Puppet Cisco IOS=12.2dx
Puppet Cisco IOS=12.2eu
Puppet Cisco IOS=12.2ew
Puppet Cisco IOS=12.2ewa
Puppet Cisco IOS=12.2ex
Puppet Cisco IOS=12.2s
Puppet Cisco IOS=12.2se
Puppet Cisco IOS=12.2sea
Puppet Cisco IOS=12.2seb
Puppet Cisco IOS=12.2su
Puppet Cisco IOS=12.2sv
Puppet Cisco IOS=12.2sx
Puppet Cisco IOS=12.2sxa
Puppet Cisco IOS=12.2sxb
Puppet Cisco IOS=12.2sxd
Puppet Cisco IOS=12.2sy
Puppet Cisco IOS=12.2sz
Puppet Cisco IOS=12.2t
Puppet Cisco IOS=12.2xa
Puppet Cisco IOS=12.2xc
Puppet Cisco IOS=12.2xf
Puppet Cisco IOS=12.2xn
Puppet Cisco IOS=12.2xs
Puppet Cisco IOS=12.2ye
Puppet Cisco IOS=12.2yk
Puppet Cisco IOS=12.2yo
Puppet Cisco IOS=12.2yx
Puppet Cisco IOS=12.2yz
Puppet Cisco IOS=12.2za
Puppet Cisco IOS=12.3t
Puppet Cisco IOS=12.3xd
Puppet Cisco IOS=12.3xe
Puppet Cisco IOS=12.3xf
Puppet Cisco IOS=12.3xg
Puppet Cisco IOS=12.3xh
Puppet Cisco IOS=12.3xi
Puppet Cisco IOS=12.3xj
Puppet Cisco IOS=12.3xk
Puppet Cisco IOS=12.3xl
Puppet Cisco IOS=12.3xm
Puppet Cisco IOS=12.3xq
Puppet Cisco IOS=12.3xr
Puppet Cisco IOS=12.3xs
Puppet Cisco IOS=12.3xu
Puppet Cisco IOS=12.3xw
Puppet Cisco IOS=12.3xx
Puppet Cisco IOS=12.3xy
Puppet Cisco IOS=12.3ya
Puppet Cisco IOS=12.3yd
Puppet Cisco IOS=12.3yf
Puppet Cisco IOS=12.3yg
Puppet Cisco IOS=12.3yh
Puppet Cisco IOS=12.3yj
Puppet Cisco IOS=12.3yk

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-1021?

    CVE-2005-1021 has a severity level that allows remote attackers to cause a denial of service through memory consumption.

  • How do I fix CVE-2005-1021?

    To fix CVE-2005-1021, upgrade to a version of Cisco IOS that is not affected by this vulnerability, such as 12.4 or later.

  • Which versions of Cisco IOS are affected by CVE-2005-1021?

    CVE-2005-1021 affects Cisco IOS versions 12.0 through 12.3.

  • What type of attack is made possible by CVE-2005-1021?

    CVE-2005-1021 enables a denial of service attack due to a memory leak when authenticating against a TACACS+ server.

  • Can CVE-2005-1021 be exploited remotely?

    Yes, CVE-2005-1021 can be exploited remotely by sending incorrect usernames or passwords.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203