![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11632 |
Category: | CISCO |
Title: | CSCdx17916, CSCdx61997 |
Summary: | NOSUMMARY |
Description: | Description: It is possible to crash the remote router by sending malformed Response Time Responder (RTR) packets. For this flaw to be exploitable, the router needs to have RTR responder enabled. This bug is referenced as CISCO bug id CSCdx17916 and CSCdx61997 Solution : See http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
BugTraq ID: 7607 Common Vulnerability Exposure (CVE) ID: CVE-2003-0305 Cisco Security Advisory: 20030515 Cisco Security Advisory: Cisco IOS Software Processing of SAA Packets http://www.cisco.com/warp/public/707/cisco-sa-20030515-saa.shtml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5608 |
Copyright | This script is (C) 2003 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |