7.8
CVSSv2

CVE-2003-0567

Published: 18/08/2003 Updated: 20/11/2024

Vulnerability Summary

Cisco IOS 11.x and 12.0 up to and including 12.2 allows remote malicious users to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 11.0

cisco ios 11.1

cisco ios 11.1aa

cisco ios 11.1ca

cisco ios 11.1cc

cisco ios 11.2

cisco ios 11.2p

cisco ios 11.2sa

cisco ios 11.3

cisco ios 11.3t

cisco ios 12.0

cisco ios 12.0da

cisco ios 12.0db

cisco ios 12.0dc

cisco ios 12.0s

cisco ios 12.0sc

cisco ios 12.0sl

cisco ios 12.0sp

cisco ios 12.0st

cisco ios 12.0sx

cisco ios 12.0sy

cisco ios 12.0sz

cisco ios 12.0t

cisco ios 12.0w5

cisco ios 12.0wc

cisco ios 12.0wt

cisco ios 12.0xa

cisco ios 12.0xb

cisco ios 12.0xc

cisco ios 12.0xd

cisco ios 12.0xe

cisco ios 12.0xf

cisco ios 12.0xg

cisco ios 12.0xh

cisco ios 12.0xi

cisco ios 12.0xj

cisco ios 12.0xk

cisco ios 12.0xl

cisco ios 12.0xm

cisco ios 12.0xn

cisco ios 12.0xp

cisco ios 12.0xq

cisco ios 12.0xr

cisco ios 12.0xs

cisco ios 12.0xu

cisco ios 12.0xv

cisco ios 12.0xw

cisco ios 12.1

cisco ios 12.1aa

cisco ios 12.1ax

cisco ios 12.1ay

cisco ios 12.1da

cisco ios 12.1db

cisco ios 12.1dc

cisco ios 12.1e

cisco ios 12.1ea

cisco ios 12.1eb

cisco ios 12.1ec

cisco ios 12.1ev

cisco ios 12.1ew

cisco ios 12.1ex

cisco ios 12.1ey

cisco ios 12.1m

cisco ios 12.1t

cisco ios 12.1xa

cisco ios 12.1xb

cisco ios 12.1xc

cisco ios 12.1xd

cisco ios 12.1xe

cisco ios 12.1xf

cisco ios 12.1xg

cisco ios 12.1xh

cisco ios 12.1xi

cisco ios 12.1xj

cisco ios 12.1xk

cisco ios 12.1xl

cisco ios 12.1xm

cisco ios 12.1xp

cisco ios 12.1xq

cisco ios 12.1xr

cisco ios 12.1xs

cisco ios 12.1xt

cisco ios 12.1xu

cisco ios 12.1xv

cisco ios 12.1xw

cisco ios 12.1xx

cisco ios 12.1xy

cisco ios 12.1xz

cisco ios 12.1yb

cisco ios 12.1yc

cisco ios 12.1yd

cisco ios 12.1ye

cisco ios 12.1yf

cisco ios 12.1yh

cisco ios 12.1yi

cisco ios 12.1yj

cisco ios 12.2

cisco ios 12.2b

cisco ios 12.2bc

cisco ios 12.2bw

cisco ios 12.2bx

cisco ios 12.2bz

cisco ios 12.2cx

cisco ios 12.2cy

cisco ios 12.2da

cisco ios 12.2dd

cisco ios 12.2dx

cisco ios 12.2ja

cisco ios 12.2mb

cisco ios 12.2mc

cisco ios 12.2mx

cisco ios 12.2s

cisco ios 12.2sx

cisco ios 12.2sy

cisco ios 12.2sz

cisco ios 12.2t

cisco ios 12.2xa

cisco ios 12.2xb

cisco ios 12.2xc

cisco ios 12.2xd

cisco ios 12.2xe

cisco ios 12.2xf

cisco ios 12.2xg

cisco ios 12.2xh

cisco ios 12.2xi

cisco ios 12.2xj

cisco ios 12.2xk

cisco ios 12.2xl

cisco ios 12.2xm

cisco ios 12.2xn

cisco ios 12.2xq

cisco ios 12.2xr

cisco ios 12.2xs

cisco ios 12.2xt

cisco ios 12.2xu

cisco ios 12.2xw

cisco ios 12.2ya

cisco ios 12.2yb

cisco ios 12.2yc

cisco ios 12.2yd

cisco ios 12.2yf

cisco ios 12.2yg

cisco ios 12.2yh

cisco ios 12.2yj

cisco ios 12.2yk

cisco ios 12.2yl

cisco ios 12.2ym

cisco ios 12.2yn

cisco ios 12.2yo

cisco ios 12.2yp

cisco ios 12.2yq

cisco ios 12.2yr

cisco ios 12.2ys

cisco ios 12.2yt

cisco ios 12.2yu

cisco ios 12.2yv

cisco ios 12.2yw

cisco ios 12.2yx

cisco ios 12.2yy

cisco ios 12.2yz

cisco ios 12.2za

cisco ios 12.2zb

cisco ios 12.2zc

cisco ios 12.2zd

cisco ios 12.2ze

cisco ios 12.2zf

cisco ios 12.2zg

cisco ios 12.2zh

cisco ios 12.2zj

cisco optical networking systems software 3.0

cisco optical networking systems software 3.1.0

cisco optical networking systems software 3.2.0

cisco optical networking systems software 3.3.0

cisco optical networking systems software 3.4.0

cisco optical networking systems software 4.0.0

cisco ons 15454 optical transport platform

Exploits

#!/bin/tcsh -f # # Remote DoS exploit against the recent Cisco IOS vuln Cisco doc 44020 # Vulnerable versions - all Cisco devices running IOS # Requirements : tcsh, and hping # Get hping @ wwwhpingorg # # And you know the best part? This script actually works! Unlike the few c's # floating around the net Uses swipe for the protocol bit Al ...
/* * ShadowChode - Cisco IOS IPv4 Packet Processing Denial of Service Exploit * * Ping target router/switch for TTL to host Subtract that number from 255 * and use that TTL on the command line The TTL must equal 0 or 1 when it * reaches the target The target must accept packets to the given target * interface address and there are some other cav ...
/*******************************************************/ /* cisco-bug-44020c - Copyright by Martin Kluge (martin@elxside) */ /* */ /* Feel free to modify this code as you like, as long as you include */ /* the above copyright statement ...