A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2019-09-25T20:16:01.042904Z
Updated: 2024-11-19T18:55:35.440Z
Reserved: 2019-06-04T00:00:00
Link: CVE-2019-12652
Vulnrichment
Updated: 2024-08-04T23:24:39.119Z
NVD
Status : Modified
Published: 2019-09-25T21:15:10.593
Modified: 2024-11-21T04:23:16.060
Link: CVE-2019-12652
Redhat
No data.