7.1
CWE
20
Advisory Published
Updated

CVE-2006-0340: Input Validation

First published: Sat Jan 21 2006(Updated: )

Unspecified vulnerability in Stack Group Bidding Protocol (SGBP) support in Cisco IOS 12.0 through 12.4 running on various Cisco products, when SGBP is enabled, allows remote attackers on the local network to cause a denial of service (device hang and network traffic loss) via a crafted UDP packet to port 9900.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=12.0
Puppet Cisco IOS=12.0s
Puppet Cisco IOS=12.0sc
Puppet Cisco IOS=12.0t
Puppet Cisco IOS=12.0xa
Puppet Cisco IOS=12.0xc
Puppet Cisco IOS=12.0xd
Puppet Cisco IOS=12.0xe
Puppet Cisco IOS=12.0xg
Puppet Cisco IOS=12.0xh
Puppet Cisco IOS=12.0xi
Puppet Cisco IOS=12.0xj
Puppet Cisco IOS=12.0xk
Puppet Cisco IOS=12.0xl
Puppet Cisco IOS=12.0xn
Puppet Cisco IOS=12.0xr
Puppet Cisco IOS=12.1
Puppet Cisco IOS=12.1aa
Puppet Cisco IOS=12.1e
Puppet Cisco IOS=12.1ec
Puppet Cisco IOS=12.1ex
Puppet Cisco IOS=12.1ez
Puppet Cisco IOS=12.1ga
Puppet Cisco IOS=12.1gb
Puppet Cisco IOS=12.1t
Puppet Cisco IOS=12.1xa
Puppet Cisco IOS=12.1xd
Puppet Cisco IOS=12.1xh
Puppet Cisco IOS=12.1xi
Puppet Cisco IOS=12.1xl
Puppet Cisco IOS=12.1xm
Puppet Cisco IOS=12.1xq
Puppet Cisco IOS=12.1xs
Puppet Cisco IOS=12.1xu
Puppet Cisco IOS=12.1xw
Puppet Cisco IOS=12.1xx
Puppet Cisco IOS=12.1xy
Puppet Cisco IOS=12.1xz
Puppet Cisco IOS=12.1ya
Puppet Cisco IOS=12.1yb
Puppet Cisco IOS=12.1yd
Puppet Cisco IOS=12.2
Puppet Cisco IOS=12.2b
Puppet Cisco IOS=12.2bc
Puppet Cisco IOS=12.2bw
Puppet Cisco IOS=12.2by
Puppet Cisco IOS=12.2cx
Puppet Cisco IOS=12.2dd
Puppet Cisco IOS=12.2dx
Puppet Cisco IOS=12.2mc
Puppet Cisco IOS=12.2s
Puppet Cisco IOS=12.2su
Puppet Cisco IOS=12.2sy
Puppet Cisco IOS=12.2sz
Puppet Cisco IOS=12.2t
Puppet Cisco IOS=12.2xa
Puppet Cisco IOS=12.2xb
Puppet Cisco IOS=12.2xc
Puppet Cisco IOS=12.2xf
Puppet Cisco IOS=12.2xg
Puppet Cisco IOS=12.2xk
Puppet Cisco IOS=12.2xl
Puppet Cisco IOS=12.2xs
Puppet Cisco IOS=12.2xt
Puppet Cisco IOS=12.2xv
Puppet Cisco IOS=12.2yd
Puppet Cisco IOS=12.2ye
Puppet Cisco IOS=12.2yn
Puppet Cisco IOS=12.2yt
Puppet Cisco IOS=12.2yw
Puppet Cisco IOS=12.2yx
Puppet Cisco IOS=12.2yy
Puppet Cisco IOS=12.2yz
Puppet Cisco IOS=12.2za
Puppet Cisco IOS=12.2zb
Puppet Cisco IOS=12.2zd
Puppet Cisco IOS=12.2ze
Puppet Cisco IOS=12.2zj
Puppet Cisco IOS=12.2zn
Puppet Cisco IOS=12.3
Puppet Cisco IOS=12.3b
Puppet Cisco IOS=12.3bc
Puppet Cisco IOS=12.3bw
Puppet Cisco IOS=12.3t
Puppet Cisco IOS=12.3xb
Puppet Cisco IOS=12.3xd
Puppet Cisco IOS=12.3xf
Puppet Cisco IOS=12.3xh
Puppet Cisco IOS=12.3xi
Puppet Cisco IOS=12.3xj
Puppet Cisco IOS=12.3xm
Puppet Cisco IOS=12.3xq
Puppet Cisco IOS=12.3xu
Puppet Cisco IOS=12.3xw
Puppet Cisco IOS=12.3yf
Puppet Cisco IOS=12.3yg
Puppet Cisco IOS=12.3yj
Puppet Cisco IOS=12.3yk
Puppet Cisco IOS=12.3ym
Puppet Cisco IOS=12.3yq
Puppet Cisco IOS=12.3yt
Puppet Cisco IOS=12.3yu
Puppet Cisco IOS=12.3yx
Puppet Cisco IOS=12.4
Puppet Cisco IOS=12.4mr
Puppet Cisco IOS=12.4t
Puppet Cisco IOS=12.4xa
Puppet Cisco IOS=12.4xb

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-0340?

    CVE-2006-0340 has a severity level that can lead to denial of service, affecting the availability of the affected devices.

  • How do I fix CVE-2006-0340?

    To fix CVE-2006-0340, disable the Stack Group Bidding Protocol if it is not necessary for your network operation.

  • Which Cisco IOS versions are affected by CVE-2006-0340?

    CVE-2006-0340 affects Cisco IOS versions from 12.0 to 12.4 when the Stack Group Bidding Protocol is enabled.

  • What are the potential impacts of CVE-2006-0340?

    The potential impacts of CVE-2006-0340 include device hangs and loss of network traffic due to crafted UDP packets sent by remote attackers.

  • Is CVE-2006-0340 remote or local attack vector?

    CVE-2006-0340 can be exploited by remote attackers over the local network.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203