CVE-2005-3921
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/11/2005
Last modified:
03/04/2025
Description
Cross-site scripting (XSS) vulnerability in Cisco IOS Web Server for IOS 12.0(2a) allows remote attackers to inject arbitrary web script or HTML by (1) packets containing HTML that an administrator views via an HTTP interface to the contents of memory buffers, as demonstrated by the URI /level/15/exec/-/buffers/assigned/dump; or (2) sending the router Cisco Discovery Protocol (CDP) packets with HTML payload that an administrator views via the CDP status pages. NOTE: these vectors were originally reported as being associated with the dump and packet options in /level/15/exec/-/show/buffers.
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* | 12.3 (including) | |
| cpe:2.3:o:cisco:ios:12.3\(1a\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)ja:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)ja5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)jk:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)jk1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)t3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)t8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xa4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xa5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xc4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.3\(2\)xe3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/17780
- http://secunia.com/advisories/18528
- http://securityreason.com/securityalert/227
- http://securitytracker.com/id?1015275=
- http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372
- http://www.infohacking.com/INFOHACKING_RESEARCH/Our_Advisories/cisco/index.html
- http://www.securityfocus.com/archive/1/417916/100/0/threaded
- http://www.securityfocus.com/bid/15602
- http://www.securityfocus.com/bid/16291
- http://www.vupen.com/english/advisories/2005/2657
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5867
- http://secunia.com/advisories/17780
- http://secunia.com/advisories/18528
- http://securityreason.com/securityalert/227
- http://securitytracker.com/id?1015275=
- http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml
- http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372
- http://www.infohacking.com/INFOHACKING_RESEARCH/Our_Advisories/cisco/index.html
- http://www.securityfocus.com/archive/1/417916/100/0/threaded
- http://www.securityfocus.com/bid/15602
- http://www.securityfocus.com/bid/16291
- http://www.vupen.com/english/advisories/2005/2657
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5867



