First published: Wed Feb 14 2007(Updated: )
The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.3ym | |
Cisco IOS | =12.3yq | |
Cisco IOS | =12.3xr | |
Cisco IOS | =12.4t | |
Cisco IOS | =12.3ya | |
Cisco IOS | =12.3xs | |
Cisco IOS | =12.3xw | |
Cisco IOS | =12.4mr | |
Cisco IOS | =12.3yj | |
Cisco IOS | =12.3t | |
Cisco IOS | =12.3yd | |
Cisco IOS | =12.3yk | |
Cisco IOS | =12.3yt | |
Cisco IOS | =12.3yz | |
Cisco IOS | =12.3yg | |
Cisco IOS | =12.3xy | |
Cisco IOS | =12.4 | |
Cisco IOS | =12.4xa | |
Cisco IOS | =12.3yx | |
Cisco IOS | =12.3xq | |
Cisco IOS | =12.3ys | |
Cisco IOS | =12.3yh | |
Cisco IOS | =12.4xb | |
Cisco IOS | =12.3xx | |
Cisco IOS | =12.3yi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.