exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Cisco Security Advisory 20100812-tcp
Posted Aug 13, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software Release, 15.1(2)T is affected by a denial of service (DoS) vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain in a SYNRCVD or SYNSENT state. Enough embryonic TCP connections in these states could consume system resources and prevent an affected device from accepting or initiating new TCP connections, including any TCP-based remote management access to the device. No authentication is required to exploit this vulnerability. An attacker does not need to complete a three-way handshake to trigger this vulnerability; therefore, this this vulnerability can be exploited using spoofed packets. This vulnerability may be triggered by normal network traffic.

tags | advisory, remote, denial of service, spoof, tcp
systems | cisco
advisories | CVE-2010-2827
SHA-256 | 41c4ec00492ea38d9946e6ed360e9f5049fc4ce327377e0ad4e3a7182f434708
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close