Vulnerabilites related to cisco - 7100_router
cve-2000-0268
Vulnerability from cvelistv5
Published
2000-06-02 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1123 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/1289 | vdb-entry, x_refsource_OSVDB | |
http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T05:14:20.398Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1123", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/1123", }, { name: "1289", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/1289", }, { name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2000-04-20T00:00:00", descriptions: [ { lang: "en", value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2004-09-02T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1123", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/1123", }, { name: "1289", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/1289", }, { name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2000-0268", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1123", refsource: "BID", url: "http://www.securityfocus.com/bid/1123", }, { name: "1289", refsource: "OSVDB", url: "http://www.osvdb.org/1289", }, { name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability", refsource: "CISCO", url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2000-0268", datePublished: "2000-06-02T04:00:00", dateReserved: "2000-04-26T00:00:00", dateUpdated: "2024-08-08T05:14:20.398Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2000-04-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 11.3aa | |
cisco | ios | 12.0\(2\) | |
cisco | ios | 12.0\(2\)xc | |
cisco | ios | 12.0\(2\)xd | |
cisco | ios | 12.0\(2\)xf | |
cisco | ios | 12.0\(2\)xg | |
cisco | ios | 12.0\(3\)t2 | |
cisco | ios | 12.0\(4\) | |
cisco | ios | 12.0\(4\)s | |
cisco | ios | 12.0\(4\)t | |
cisco | ios | 12.0\(5\) | |
cisco | ios | 12.0\(6\) | |
cisco | ios | 12.0\(7\)t | |
cisco | accesspath | ls-3 | |
cisco | accesspath | ts-3 | |
cisco | accesspath | vs-3 | |
cisco | as5200 | * | |
cisco | as5300 | * | |
cisco | as5800 | * | |
cisco | system_controller_3640 | * | |
cisco | voice_gateway_as5800 | * | |
cisco | 3660_router | * | |
cisco | 7100_router | * | |
cisco | 7200_router | * | |
cisco | 7500_router | * | |
cisco | ubr7200 | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*", matchCriteriaId: "D8783C0A-990A-4B79-8BF9-64E425DA585E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "77DDC99D-8B73-452C-94A7-A9A48F2F379B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", matchCriteriaId: "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", matchCriteriaId: "C48466C4-5A1E-4C71-8822-32D387B36B8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "08E23131-D207-4D98-96D5-2B71FF792604", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", matchCriteriaId: "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "E7109585-1433-4940-B7C9-C561DEAF1498", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "1A0D82E1-CCF7-429B-A637-479E839EAE3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "4F1B2747-4A9C-44FC-BBA8-39E338B30417", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "D5BB7513-C232-4B4F-BE68-972B05086ABD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", matchCriteriaId: "ECCE69A3-41C6-4893-86D4-7F264352C8A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", matchCriteriaId: "FA654CE6-82C3-43D0-BAED-70E88A740BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:accesspath:ls-3:*:*:*:*:*:*:*", matchCriteriaId: "7D8CD3D5-C52F-4B38-8DA7-5441B7CD000D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:accesspath:ts-3:*:*:*:*:*:*:*", matchCriteriaId: "1DD96A21-1862-4E35-BD02-2928DD44B3C1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:accesspath:vs-3:*:*:*:*:*:*:*", matchCriteriaId: "D537F5F7-8227-46CC-A30F-B81C25AD9FA3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:as5200:*:*:*:*:*:*:*:*", matchCriteriaId: "6E74902A-1785-40FE-92A0-55BD27D6FEC3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:as5300:*:*:*:*:*:*:*:*", matchCriteriaId: "883975E5-FE8B-4DC4-8F71-E68791ABD17D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:as5800:*:*:*:*:*:*:*:*", matchCriteriaId: "823E4E18-8719-4167-83BE-CF2DA55558E9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:system_controller_3640:*:*:*:*:*:*:*:*", matchCriteriaId: "B7C0CC3E-3E01-4607-BE75-4A6A1074DC82", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:voice_gateway_as5800:*:*:*:*:*:*:*:*", matchCriteriaId: "9D185F2F-788C-44F1-A635-90E33A4A88B9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:3660_router:*:*:*:*:*:*:*:*", matchCriteriaId: "5EAE468C-7D0F-4F6D-B598-B2E422EFDCD5", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:7100_router:*:*:*:*:*:*:*:*", matchCriteriaId: "C3715102-E348-457A-9546-94BBCEF91A00", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*", matchCriteriaId: "60DEA083-B9BC-42DB-A4F7-986A5A185DE6", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*", matchCriteriaId: "FCFAA111-F831-4BC9-BCD7-246ED6C0F3FF", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:ubr7200:*:*:*:*:*:*:*:*", matchCriteriaId: "0B4917DF-B485-46A3-9515-8BDDD1F13C77", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.", }, ], id: "CVE-2000-0268", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2000-04-20T04:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/1289", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/1123", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/1289", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/1123", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }