5.4
CVSSv2

CVE-2009-2049

Published: 30/07/2009 Updated: 29/09/2017
CVSS v2 Base Score: 5.4 | Impact Score: 6.9 | Exploitability Score: 4.9
VMScore: 481
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

Cisco IOS 12.0(32)S12 up to and including 12.0(32)S13 and 12.0(33)S3 up to and including 12.0(33)S4, 12.0(32)SY8 up to and including 12.0(32)SY9, 12.2(33)SXI1 up to and including 12.2(33)SXI2, 12.2XNC prior to 12.2(33)XNC2, 12.2XND prior to 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 up to and including 2.3.1t and 2.4 up to and including 2.4.0; when RFC4893 BGP routing is enabled, allows remote malicious users to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 12.0\\(33\\)s3

cisco ios 12.0\\(33\\)s4

cisco ios xe 2.4

cisco ios xe 2.3.1t

cisco ios 12.0\\(32\\)sy8

cisco ios 12.0\\(32\\)sy9

cisco ios 12.2xnd

cisco ios 12.2xnc

cisco ios 12.0\\(32\\)s12

cisco ios 12.0\\(32\\)s13

cisco ios xe 2.3

cisco ios xe 2.4.0

cisco ios 12.2\\(33\\)sxi2

cisco ios 12.2\\(33\\)sxi1

cisco ios 12.4\\(24\\)t1

Vendor Advisories

Recent versions of Cisco IOS Software support RFC4893 ("BGP Support for Four-octet AS Number Space") and contain two remote denial of service (DoS) vulnerabilities when handling specific Border Gateway Protocol (BGP) updates These vulnerabilities affect only devices running Cisco IOS Software with support for four-octet AS number space ...