Lucene search

K
ciscoCiscoCISCO-SA-20050406-SSH
HistoryApr 06, 2005 - 4:00 p.m.

Vulnerabilities in Cisco IOS Secure Shell Server

2005-04-0616:00:00
tools.cisco.com
14

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.02 Low

EPSS

Percentile

88.8%

Certain release trains of Cisco Internetwork Operating System
(IOS)®, when configured to use the IOS Secure Shell
(SSH) server in combination with Terminal Access Controller Access Control
System Plus (TACACS+) as a means to perform remote management tasks on IOS
devices, may contain two vulnerabilities that can potentially cause IOS devices
to exhaust resources and reload. Repeated exploitation of these vulnerabilities
can result in a Denial of Service (DoS) condition. Use of SSH with other
authentication methods like Remote Authentication Dial In User Service (RADIUS)
and the local user database may also be affected.

Cisco has made free software available to address these
vulnerabilities for all affected customers. There are workarounds available to
mitigate the effects of the vulnerability (see the Workarounds[“#workarounds”] section.)

This advisory will be posted at
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050406-ssh[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050406-ssh”].

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.02 Low

EPSS

Percentile

88.8%

Related for CISCO-SA-20050406-SSH