{"vuid":"VU#178024","idnumber":"178024","name":"Cisco IOS vulnerable to deferred DoS via SYN scan to certain TCP port ranges","keywords":["CSCds07326","Cisco","IOS","reload","DoS","scan","show running-config","write memory"],"overview":"Cisco Internetwork Operating System (IOS) may reload unexpectedly after being scanned on certain ports.","clean_desc":"Certain versions of Cisco IOS contain a vulnerability that allows the router to enter an unstable state after receiving a connection attempt on any TCP port in the following ranges: 3100-3999, 5100-5999, 7100-7999, and 10100-10999. In this state, the router will reload at the next execution of \"show running-config,\" \"write memory,\" or any command that causes the configuration file to be accessed.","impact":"Attackers may cause Cisco routers to reload and cause a denial of service.","resolution":"Review Cisco Systems's security advisory to determine which versions of IOS are vulnerable and which version you should obtain to eliminate this vulnerability. The advisory is available at: http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml","workarounds":"None.","sysaffected":"","thanks":"Thanks to Cisco Systems for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml","http://www.securityfocus.com/bid/2804"],"cveids":["CVE-2001-0750"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-10-20T00:42:50Z","publicdate":"2001-05-24T00:00:00Z","datefirstpublished":"2001-10-25T23:44:23Z","dateupdated":"2001-10-25T23:44:26Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"11.8125","cam_scorecurrentwidelyknown":"13.5","cam_scorecurrentwidelyknownexploited":"20.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.8125,"vulnote":null}