- Description
- Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size.
- Source
- cve@mitre.org
- NVD status
- Modified
- Products
- ios, multiservice_platform_2650, multiservice_platform_2650xm, multiservice_platform_2651, multiservice_platform_2651xm, 7200_router, 7300_router, 7500_router, 7600_router, catalyst_7600
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "9E49B392-5366-422D-A10E-EE4F3A33C4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF707A6-5834-4295-8B38-17F279D49C82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0E67EE-AF42-4B53-B70A-45562CE164D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "9E319ADC-C636-4933-BD50-B613677AD4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv:*:*:*:*:*:*:*",
"matchCriteriaId": "1A15042D-EB07-4754-8144-947CDE669CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*",
"matchCriteriaId": "E58F4903-E834-4476-876F-8C144BD93D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "955BF110-FFBE-4368-BE06-21AC794C53AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:multiservice_platform_2650:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92D41983-E6A8-4481-AA08-42DC92EC57EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:multiservice_platform_2650xm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6E0CA8-C89C-4CDD-8063-B10E6C122F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:multiservice_platform_2651:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19293B13-7FB1-4604-923D-E8760902E8BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:multiservice_platform_2651xm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E13135-48E1-4D8C-9C0D-4EBD9A858CBD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60DEA083-B9BC-42DB-A4F7-986A5A185DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:7300_router:*:*:*:*:*:*:*:*",
"matchCriteriaId": "239E1E03-7F82-48CE-943A-9228C9EDCF9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFAA111-F831-4BC9-BCD7-246ED6C0F3FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:7600_router:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9097F459-1AE3-4924-8E81-046F84FBB041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]