First published: Tue Oct 23 2007(Updated: )
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco CatOS | =6.2 | |
Cisco CatOS | =7.4 | |
Cisco IOS | =12.3jec | |
Cisco CatOS | =6.3 | |
Cisco CatOS | =7.6 | |
Cisco CatOS | =6.4 | |
Cisco CatOS | =7.3 | |
Cisco CatOS | =8.1 | |
Cisco CatOS | =7.1 | |
Cisco CatOS | =7.5 | |
Cisco CatOS | =8.2 | |
Cisco IOS | =12.1 | |
Cisco CatOS | =6.1 | |
Cisco IOS | =12.3jea | |
Cisco IOS | =12.3ja | |
Cisco CatOS | =7.2 | |
Cisco CatOS | =8.5 | |
Cisco IOS | =12.3jeb | |
Cisco IOS | =12.4ja | |
Cisco IOS | =12.2 | |
Cisco CatOS | =8.4 | |
Cisco CatOS | =8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.