First published: Thu Dec 15 2005(Updated: )
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst | =4.5_\(10\) | |
Cisco Catalyst | =sup2plus | |
Cisco Catalyst | =sup3 | |
Cisco Catalyst 1200 Series | ||
Cisco Catalyst 1900 Series | ||
Cisco Catalyst 1900 Series | =9.0_0.07 | |
Cisco Catalyst 2800 Series | ||
Cisco Catalyst 2820 | ||
Cisco Catalyst 2820 | =9.0_0.07 | |
Cisco Catalyst 2900 | ||
Cisco Catalyst 2900 | =lre_xl | |
Cisco Catalyst 2900 | =xl | |
Cisco 2901 | ||
Cisco Catalyst 2902 | ||
Cisco Catalyst 2920 | ||
Cisco Catalyst 2926 | ||
Cisco Catalyst 2926f | ||
Cisco Catalyst 2926gl | ||
Cisco Catalyst 2926gs | ||
Cisco Catalyst 2926t | ||
Cisco Catalyst 2940 | ||
Cisco Catalyst 2948G | ||
Cisco Catalyst 2948G | ||
Cisco Catalyst 2948G-L3 | ||
Cisco Catalyst 2950 LRE | ||
Cisco Catalyst 2950 LRE | ||
Cisco Catalyst 2955 | ||
Cisco Catalyst 2970 | ||
Cisco Catalyst 2980G-A | ||
Cisco Catalyst 2980G-A | ||
Cisco Catalyst 3000 | ||
Cisco Catalyst 3200 | ||
Cisco Catalyst 3500 | ||
Cisco Catalyst 3550 | ||
Cisco Catalyst 3560 | ||
Cisco Catalyst 3750 | ||
Cisco Catalyst 3750 Metro | ||
Cisco Catalyst 3900 | ||
Cisco Catalyst 4000 | ||
Cisco Catalyst 4000 | ||
Cisco Catalyst 4000 | ||
Cisco Catalyst 4000 | ||
Cisco Catalyst 4000 | ||
Cisco Catalyst 4200 | ||
Cisco Catalyst 4224 | ||
Cisco Catalyst 4232 | ||
Cisco Catalyst 4232 | ||
Cisco Catalyst 4500 | ||
Cisco Catalyst 4500 | ||
Cisco Catalyst 4503-e | ||
Cisco Catalyst 4506-E | ||
Cisco Catalyst 4507R/E | ||
Cisco Catalyst 4510R | ||
Cisco Catalyst 4840G | ||
Cisco Catalyst 4908G-L3 | ||
Cisco Catalyst 4912G | ||
Cisco Catalyst 4948e Ethernet Switch | ||
Cisco Catalyst 5000 | ||
Cisco Catalyst 5505 | ||
Cisco Catalyst 5509 | ||
Cisco Catalyst 6000 | ||
Cisco Catalyst 6000 | ||
Cisco Catalyst 6000 | ||
Cisco Catalyst 6000 | =2.2\(1a\) | |
Cisco Catalyst 6000 | =3.1\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =2.2\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =3.1\(1a\) | |
Cisco Catalyst 6500 ws-x6380-nam | =2.1\(2\) | |
Cisco Catalyst 6500 ws-x6380-nam | =3.1\(1a\) | |
Cisco Catalyst 6500-E | ||
Cisco Catalyst 6500 Wireless Services Module | =2.2\(1a\) | |
Cisco Catalyst 6500 Wireless Services Module | =3.1\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =2.2\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =3.1\(1a\) | |
Cisco Catalyst 6500 Series Switches | =2.1\(2\) | |
Cisco Catalyst 6500 Series Switches | =3.1\(1a\) | |
Cisco Catalyst 6608 | ||
Cisco Catalyst 6624 | ||
Cisco Catalyst 7600 | ||
Cisco Catalyst 7600 | ||
Cisco Catalyst 7600 | =2.2\(1a\) | |
Cisco Catalyst 7600 | =3.1\(1a\) | |
Cisco Catalyst 7600 | =2.2\(1a\) | |
Cisco Catalyst 7600 | =3.1\(1a\) | |
Cisco Catalyst 7600 Series | =2.1\(2\) | |
Cisco Catalyst 7600 Series | =3.1\(1a\) | |
Cisco Catalyst 8500L Series Router | ||
Cisco Catalyst 8510 CSR | ||
Cisco Catalyst 8510MSR | ||
Cisco Catalyst 8540CSR | ||
Cisco Catalyst 8540MSR | ||
Cisco Catalyst WS-C2924-XL | ||
Cisco CatOS | =3.0\(7\) | |
Cisco CatOS | =4.5\(2\) | |
Cisco CatOS | =4.5\(3\) | |
Cisco CatOS | =4.5\(4\) | |
Cisco CatOS | =4.5\(4b\) | |
Cisco CatOS | =4.5\(5\) | |
Cisco CatOS | =4.5\(6\) | |
Cisco CatOS | =4.5\(7\) | |
Cisco CatOS | =4.5\(8\) | |
Cisco CatOS | =4.5\(9\) | |
Cisco CatOS | =4.5\(10\) | |
Cisco CatOS | =4.5\(11\) | |
Cisco CatOS | =4.5\(12\) | |
Cisco CatOS | =4.5\(13a\) | |
Cisco CatOS | =5.1 | |
Cisco CatOS | =5.1\(1\) | |
Cisco CatOS | =5.1\(1a\) | |
Cisco CatOS | =5.1\(2a\) | |
Cisco CatOS | =5.2 | |
Cisco CatOS | =5.2\(1\) | |
Cisco CatOS | =5.2\(1a\) | |
Cisco CatOS | =5.2\(2\) | |
Cisco CatOS | =5.2\(3\) | |
Cisco CatOS | =5.2\(4\) | |
Cisco CatOS | =5.2\(5\) | |
Cisco CatOS | =5.2\(6\) | |
Cisco CatOS | =5.2\(7\) | |
Cisco CatOS | =5.3\(1\)csx | |
Cisco CatOS | =5.3\(1a\)csx | |
Cisco CatOS | =5.3\(2\)csx | |
Cisco CatOS | =5.3\(3\)csx | |
Cisco CatOS | =5.3\(4\)csx | |
Cisco CatOS | =5.3\(5\)csx | |
Cisco CatOS | =5.3\(5a\)csx | |
Cisco CatOS | =5.3\(6\)csx | |
Cisco CatOS | =5.4 | |
Cisco CatOS | =5.4\(1\) | |
Cisco CatOS | =5.4\(2\) | |
Cisco CatOS | =5.4\(3\) | |
Cisco CatOS | =5.4\(4\) | |
Cisco CatOS | =5.5 | |
Cisco CatOS | =5.5\(1\) | |
Cisco CatOS | =5.5\(2\) | |
Cisco CatOS | =5.5\(3\) | |
Cisco CatOS | =5.5\(4\) | |
Cisco CatOS | =5.5\(4a\) | |
Cisco CatOS | =5.5\(4b\) | |
Cisco CatOS | =5.5\(5\) | |
Cisco CatOS | =5.5\(6\) | |
Cisco CatOS | =5.5\(7\) | |
Cisco CatOS | =5.5\(13\) | |
Cisco CatOS | =5.5\(19\) | |
Cisco CatOS | =6.1\(1\) | |
Cisco CatOS | =6.1\(1a\) | |
Cisco CatOS | =6.1\(1b\) | |
Cisco CatOS | =6.1\(1c\) | |
Cisco CatOS | =6.1\(1d\) | |
Cisco CatOS | =6.1\(2\) | |
Cisco CatOS | =6.1\(2.13\) | |
Cisco CatOS | =6.1\(3\) | |
Cisco CatOS | =6.2\(0.110\) | |
Cisco CatOS | =6.2\(0.111\) | |
Cisco CatOS | =6.2\(3\) | |
Cisco CatOS | =6.3\(0.7\)pan | |
Cisco CatOS | =6.3\(4\) | |
Cisco CatOS | =6.3\(5\) | |
Cisco CatOS | =6.4\(4a\) | |
Cisco CatOS | =7.1 | |
Cisco CatOS | =7.1\(2\) | |
Cisco CatOS | =7.2\(2\) | |
Cisco CatOS | =7.5\(1\) | |
Cisco CatOS | =7.6\(1\) | |
Cisco CatOS | =7.6\(2\) | |
Cisco IOS | =11.2\(8.2\)sa6 | |
Cisco IOS | =12.0\(5.2\)xu |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4258 is classified as a denial of service vulnerability that can cause device crashes.
To fix CVE-2005-4258, you should update the firmware of the affected Cisco Catalyst Switches to the latest available version.
CVE-2005-4258 affects various models of Cisco Catalyst Switches, including Catalyst 4000, 5000, and 6000 series.
Exploitation of CVE-2005-4258 may lead to a denial of service, resulting in crashes of the affected switch devices.
Yes, CVE-2005-4258 is exploitable by sending specially crafted IP packets with matching source and destination IPs and ports with the SYN flag set.