CVE-2004-1111
Summary
| CVE | CVE-2004-1111 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-01-10 05:00:00 UTC |
| Updated | 2017-10-11 01:29:00 UTC |
| Description | Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | 7200 Router | All | All | All | All |
| Hardware | Cisco | 7200 Router | All | All | All | All |
| Hardware | Cisco | 7300 Router | All | All | All | All |
| Hardware | Cisco | 7300 Router | All | All | All | All |
| Hardware | Cisco | 7500 Router | All | All | All | All |
| Hardware | Cisco | 7500 Router | All | All | All | All |
| Hardware | Cisco | 7600 Router | All | All | All | All |
| Hardware | Cisco | 7600 Router | All | All | All | All |
| Hardware | Cisco | Catalyst 7600 | All | All | sup720_msfc3 | All |
| Hardware | Cisco | Catalyst 7600 | All | All | sup720_msfc3 | All |
| Operating System | Cisco | Ios | 12.2(14)sz | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)ew | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)ewa | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)s | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)se | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)sv | All | All | All |
| Operating System | Cisco | Ios | 12.2(18)sw | All | All | All |
| Operating System | Cisco | Ios | 12.2(20)ew | All | All | All |
| Operating System | Cisco | Ios | 12.2\(14\)sz | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)ew | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)ewa | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)s | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)se | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)sv | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)sw | All | All | All |
| Operating System | Cisco | Ios | 12.2\(20\)ew | All | All | All |
| Operating System | Cisco | Ios | 12.2\(14\)sz | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)ew | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)ewa | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)s | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)se | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)sv | All | All | All |
| Operating System | Cisco | Ios | 12.2\(18\)sw | All | All | All |
| Operating System | Cisco | Ios | 12.2\(20\)ew | All | All | All |
| Hardware | Cisco | Multiservice Platform 2650 | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2650 | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2650xm | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2650xm | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2651 | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2651 | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2651xm | All | All | All | All |
| Hardware | Cisco | Multiservice Platform 2651xm | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| P-034 | CIAC | www.ciac.org | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| US-CERT Technical Cyber Security Alert TA04-316A -- Cisco IOS Input Queue Vulnerability | CERT | www.us-cert.gov | US Government Resource |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | CISCO | www.cisco.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| US-CERT Vulnerability Note VU#630104 | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.