Lucene search

K
cve[email protected]CVE-2005-0600
HistoryMar 01, 2005 - 5:00 a.m.

CVE-2005-0600

2005-03-0105:00:00
web.nvd.nist.gov
36
cisco
acns
denial of service
vulnerability
cve-2005-0600

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.9%

Cisco devices running Application and Content Networking System (ACNS) 5.0, 5.1 before 5.1.13.7, or 5.2 before 5.2.3.9 allow remote attackers to cause a denial of service (bandwidth consumption) via “crafted IP packets” that are continuously forwarded.

Affected configurations

NVD
Node
ciscoapplication_and_content_networking_softwareMatch\(acns\)
OR
ciscoapplication_and_content_networking_softwareMatch4.0.3
OR
ciscoapplication_and_content_networking_softwareMatch4.1.1
OR
ciscoapplication_and_content_networking_softwareMatch4.1.3
OR
ciscoapplication_and_content_networking_softwareMatch4.2
OR
ciscoapplication_and_content_networking_softwareMatch4.2.9
OR
ciscoapplication_and_content_networking_softwareMatch4.2.11
OR
ciscoapplication_and_content_networking_softwareMatch5.0
OR
ciscoapplication_and_content_networking_softwareMatch5.0.1
OR
ciscoapplication_and_content_networking_softwareMatch5.0.3
OR
ciscoapplication_and_content_networking_softwareMatch5.0.5
OR
ciscoapplication_and_content_networking_softwareMatch5.1
OR
ciscocontent_delivery_managerMatch4630
OR
ciscocontent_delivery_managerMatch4650
OR
ciscocontent_distribution_manager_4630
OR
ciscocontent_distribution_manager_4630Match4.0
OR
ciscocontent_distribution_manager_4630Match4.1
OR
ciscocontent_distribution_manager_4650
OR
ciscocontent_distribution_manager_4650Match4.0
OR
ciscocontent_distribution_manager_4650Match4.1
OR
ciscocontent_distribution_manager_4670
OR
ciscocontent_engineMatch507
OR
ciscocontent_engineMatch507_2.2_.0
OR
ciscocontent_engineMatch507_3.1
OR
ciscocontent_engineMatch507_4.0
OR
ciscocontent_engineMatch507_4.1
OR
ciscocontent_engineMatch510
OR
ciscocontent_engineMatch560
OR
ciscocontent_engineMatch560_2.2_.0
OR
ciscocontent_engineMatch560_3.1
OR
ciscocontent_engineMatch560_4.0
OR
ciscocontent_engineMatch560_4.1
OR
ciscocontent_engineMatch565
OR
ciscocontent_engineMatch590
OR
ciscocontent_engineMatch590_2.2_.0
OR
ciscocontent_engineMatch590_3.1
OR
ciscocontent_engineMatch590_4.0
OR
ciscocontent_engineMatch590_4.1
OR
ciscocontent_engineMatch7320
OR
ciscocontent_engineMatch7320_2.2_.0
OR
ciscocontent_engineMatch7320_3.1
OR
ciscocontent_engineMatch7320_4.0
OR
ciscocontent_engineMatch7320_4.1
OR
ciscocontent_engineMatch7325
OR
ciscocontent_engine_module_for_cisco_routerMatch2600_series
OR
ciscocontent_engine_module_for_cisco_routerMatch2800_series
OR
ciscocontent_engine_module_for_cisco_routerMatch3600_series
OR
ciscocontent_engine_module_for_cisco_routerMatch3700_series
OR
ciscocontent_engine_module_for_cisco_routerMatch3800_series
OR
ciscoenterprise_content_delivery_network_softwareMatch4.0
OR
ciscoenterprise_content_delivery_network_softwareMatch4.1
OR
ciscocontent_router_4430
OR
ciscocontent_router_4450

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.9%

Related for CVE-2005-0600