{"vuid":"VU#360296","idnumber":"360296","name":"Cisco ACNS may be vulnerable to DoS via malformed IP packets","keywords":["Cisco","Application and Content Networking System","ACNS","DoS","denial of service","CSCef30460"],"overview":"A vulnerability in Cisco ACNS may allow a remote attacker to cause a denial of service on an affected device.","clean_desc":"Cisco Application and Content Networking System (ACNS) is an integrated caching and content-delivery platform. Specially crafted IP packets can cause excessive CPU utilization on an affected device. A reboot of the device is required to recover.","impact":"A remote, unauthenticated attacker could cause a denial-of-service condition on an affected system.","resolution":"Apply a patch or upgrade Please refer to the \"Software Versions and Fixes\" section of the Cisco Security Advisory for more information on upgrading.","workarounds":"Restrict access Use Access Control Lists (ACLs) to block or restrict access to affected devices from untrusted networks. Please see the \"Workarounds\" section of the Cisco Security Advisory.","sysaffected":"","thanks":"This vulnerability was reported by the Cisco Systems Product Security Incident Response Team.","author":"This document was written by Will Dormann.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml","http://secunia.com/advisories/14395","http://www.securityfocus.com/bid/12648","http://securitytracker.com/alerts/2005/Feb/1013286.html","http://xforce.iss.net/xforce/xfdb/19468","http://www.osvdb.org/displayvuln.php?osvdb_id=14121"],"cveids":["CVE-2005-0599"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-24T19:29:37Z","publicdate":"2005-02-24T00:00:00Z","datefirstpublished":"2005-06-08T15:05:44Z","dateupdated":"2005-06-08T18:54:05Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.465","cam_scorecurrentwidelyknown":"5.04","cam_scorecurrentwidelyknownexploited":"8.19","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.465,"vulnote":null}