5
CVSSv2

CVE-2004-1111

Published: 10/01/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote malicious users to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 12.2\\(18\\)ew

cisco ios 12.2\\(18\\)ewa

cisco ios 12.2\\(18\\)s

cisco ios 12.2\\(18\\)se

cisco ios 12.2\\(14\\)sz

cisco ios 12.2\\(20\\)ew

cisco ios 12.2\\(18\\)sv

cisco ios 12.2\\(18\\)sw

cisco multiservice_platform_2650

cisco multiservice_platform_2650xm

cisco multiservice_platform_2651

cisco multiservice_platform_2651xm

cisco catalyst 7600

cisco 7500 router

cisco 7600 router

cisco 7200 router

cisco 7300 router

Vendor Advisories

Cisco IOS® devices running branches of Cisco IOS version 122S that have Dynamic Host Configuration Protocol (DHCP) server or relay agent enabled, even if not configured, are vulnerable to a denial of service where the input queue becomes blocked when receiving specifically crafted DHCP packets Cisco is providing free fixed software to ad ...