ID OSVDB:15303
Type osvdb
Reporter OSVDB
Modified 2005-04-06T09:01:21
Description
Vulnerability Description
Cisco IOS contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker causes many failed logins to the device with SSH authentication using TACACS, which causes a memory leak to occur, and will result in loss of availability for the device.
Solution Description
Currently, there are no known workarounds or upgrades to correct this issue. However, Cisco has released applicable patches to address this vulnerability.
Short Description
Cisco IOS contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker causes many failed logins to the device with SSH authentication using TACACS, which causes a memory leak to occur, and will result in loss of availability for the device.
References:
Vendor URL: http://www.cisco.com/
Security Tracker: 1013655
Secunia Advisory ID:14854
Related OSVDB ID: 15302
Other Advisory URL: http://www.cisco.com/warp/public/707/cisco-sa-20050406-ssh.shtml
Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0101.html
Keyword: CSCed65285
{"edition": 1, "title": "Cisco IOS Secure Shell Server TACACS+ Authentication Failure Memory Exhaustion DoS", "bulletinFamily": "software", "published": "2005-04-06T09:01:21", "lastseen": "2017-04-28T13:20:11", "history": [], "modified": "2005-04-06T09:01:21", "reporter": "OSVDB", "hash": "0ae3bec9f7c3798d92732e7cfc686016b227766cfd2da4573a5d6c2d18f493e0", "viewCount": 0, "href": "https://vulners.com/osvdb/OSVDB:15303", "description": "## Vulnerability Description\nCisco IOS contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker causes many failed logins to the device with SSH authentication using TACACS, which causes a memory leak to occur, and will result in loss of availability for the device.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, Cisco has released applicable patches to address this vulnerability.\n## Short Description\nCisco IOS contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker causes many failed logins to the device with SSH authentication using TACACS, which causes a memory leak to occur, and will result in loss of availability for the device.\n## References:\nVendor URL: http://www.cisco.com/\nSecurity Tracker: 1013655\n[Secunia Advisory ID:14854](https://secuniaresearch.flexerasoftware.com/advisories/14854/)\n[Related OSVDB ID: 15302](https://vulners.com/osvdb/OSVDB:15302)\nOther Advisory URL: http://www.cisco.com/warp/public/707/cisco-sa-20050406-ssh.shtml\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0101.html\nKeyword: CSCed65285\n", "affectedSoftware": [{"name": "IOS", "version": "12.2Y*", "operator": "eq"}, {"name": "IOS", "version": "12.1EU", "operator": "eq"}, {"name": "IOS", "version": "12.2SY", "operator": "eq"}, {"name": "IOS", "version": "12.1XT", "operator": "eq"}, {"name": "IOS", "version": "12.2SXB", "operator": "eq"}, {"name": "IOS", "version": "12.1YA", "operator": "eq"}, {"name": "IOS", "version": "12.3XU", "operator": "eq"}, {"name": "IOS", "version": "12.2T", "operator": "eq"}, {"name": "IOS", "version": "12.3YG", "operator": "eq"}, {"name": "IOS", "version": "12.1XF", "operator": "eq"}, {"name": "IOS", "version": "12.1XL", "operator": "eq"}, {"name": "IOS", "version": "12.2ZA", "operator": "eq"}, {"name": "IOS", "version": "12.3XS", "operator": "eq"}, {"name": "IOS", "version": "12.3Xx", "operator": "eq"}, {"name": "IOS", "version": "12.1DC", "operator": "eq"}, {"name": "IOS", "version": "12.2SEB", "operator": "eq"}, {"name": "IOS", "version": "12.1E", "operator": "eq"}, {"name": "IOS", "version": "12.1XM", "operator": "eq"}, {"name": "IOS", "version": "12.3XE", "operator": "eq"}, {"name": "IOS", "version": "12.2SX", "operator": "eq"}, {"name": "IOS", "version": "12.3T", "operator": "eq"}, {"name": "IOS", "version": "12.3YK", "operator": "eq"}, {"name": "IOS", "version": "12.2S", "operator": "eq"}, {"name": "IOS", "version": "12.2EX", "operator": "eq"}, {"name": "IOS", "version": "12.3XD", "operator": "eq"}, {"name": "IOS", "version": "12.2EU", "operator": "eq"}, {"name": "IOS", "version": "12.3YA", "operator": "eq"}, {"name": "IOS", "version": "12.1XI", "operator": "eq"}, {"name": "IOS", "version": "12.1XV", "operator": "eq"}, {"name": "IOS", "version": "12.3XF", "operator": "eq"}, {"name": "IOS", "version": "12.3XI", "operator": "eq"}, {"name": "IOS", "version": "12.2SXD", "operator": "eq"}, {"name": "IOS", "version": "12.1EB", "operator": "eq"}, {"name": "IOS", "version": "12.3XJ", "operator": "eq"}, {"name": "IOS", "version": "12.1XP", "operator": "eq"}, {"name": "IOS", "version": "12.1XD", "operator": "eq"}, {"name": "IOS", "version": "12.1YH", "operator": "eq"}, {"name": "IOS", "version": "12.1T", "operator": "eq"}, {"name": "IOS", "version": "12.1XH", "operator": "eq"}, {"name": "IOS", "version": "12.3XW", "operator": "eq"}, {"name": "IOS", "version": "12.3YF", "operator": "eq"}, {"name": "IOS", "version": "12.2X*", "operator": "eq"}, {"name": "IOS", "version": "12.1YI", "operator": "eq"}, {"name": "IOS", "version": "12.0S", "operator": "eq"}, {"name": "IOS", "version": "12.3XQ", "operator": "eq"}, {"name": "IOS", "version": "12.1AZ", "operator": "eq"}, {"name": "IOS", "version": "12.1YC", "operator": "eq"}, {"name": "IOS", "version": "12.1AX", "operator": "eq"}, {"name": "IOS", "version": "12.2", "operator": "eq"}, {"name": "IOS", "version": "12.3YH", "operator": "eq"}, {"name": "IOS", "version": "12.2SV", "operator": "eq"}, {"name": "IOS", "version": "12.1EX", "operator": "eq"}, {"name": "IOS", "version": "12.2SE", "operator": "eq"}, {"name": "IOS", "version": "12.1DB", "operator": "eq"}, {"name": "IOS", "version": "12.3XH", "operator": "eq"}, {"name": "IOS", "version": "12.3XM", "operator": "eq"}, {"name": "IOS", "version": "12.2SEA", "operator": "eq"}, {"name": "IOS", "version": "12.1YF", "operator": "eq"}, {"name": "IOS", "version": "12.2SXA", "operator": "eq"}, {"name": "IOS", "version": "12.3XR", "operator": "eq"}, {"name": "IOS", "version": "12.0SX", "operator": "eq"}, {"name": "IOS", "version": "12.2SU", "operator": "eq"}, {"name": "IOS", "version": "12.2SZ", "operator": "eq"}, {"name": "IOS", "version": "12.1YE", "operator": "eq"}, {"name": "IOS", "version": "12.3XL", "operator": "eq"}, {"name": "IOS", "version": "12.3XY", "operator": "eq"}, {"name": "IOS", "version": "12.2B", "operator": "eq"}, {"name": "IOS", "version": "12.3YJ", "operator": "eq"}, {"name": "IOS", "version": "12.1EC", "operator": "eq"}, {"name": "IOS", "version": "12.1XQ", "operator": "eq"}, {"name": "IOS", "version": "12.1YB", "operator": "eq"}, {"name": "IOS", "version": "12.1XG", "operator": "eq"}, {"name": "IOS", "version": "12.3XK", "operator": "eq"}, {"name": "IOS", "version": "12.2DD", "operator": "eq"}, {"name": "IOS", "version": "12.1EW", "operator": "eq"}, {"name": "IOS", "version": "12.1YD", "operator": "eq"}, {"name": "IOS", "version": "12.1XE", "operator": "eq"}, {"name": "IOS", "version": "12.1XR", "operator": "eq"}, {"name": "IOS", "version": "12.1XU", "operator": "eq"}, {"name": "IOS", "version": "12.2DX", "operator": "eq"}, {"name": "IOS", "version": "12.2EW", "operator": "eq"}, {"name": "IOS", "version": "12.3XG", "operator": "eq"}, {"name": "IOS", "version": "12.2EWA", "operator": "eq"}, {"name": "IOS", "version": "12.1EA", "operator": "eq"}, {"name": "IOS", "version": "12.3YD", "operator": "eq"}], "type": "osvdb", "hashmap": [{"key": "affectedSoftware", "hash": "a7b34286f7c8e4111b77b37609ab210a"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "db6c85d6fbec117f00b9b76f00af4983"}, {"key": "href", "hash": "d9f758fc468f951be7bfa4853c59f1ca"}, {"key": "modified", "hash": "8f7fe20f7ad221065cd4fe3043ef6fb4"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "8f7fe20f7ad221065cd4fe3043ef6fb4"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "955b328dc7cd615c13af5464c9183464"}, {"key": "title", "hash": "bc7d276d253f8c639b745ed50d85d526"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "references": [], "objectVersion": "1.2", "enchantments": {"score": {"value": 0.3, "vector": "NONE", "modified": "2017-04-28T13:20:11"}, "dependencies": {"references": [], "modified": "2017-04-28T13:20:11"}, "vulnersScore": 0.3}, "cvss": {"vector": "NONE", "score": 0.0}, "cvelist": [], "id": "OSVDB:15303"}
{}