CVE-2005-3481
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/11/2005
Last modified:
03/04/2025
Description
Cisco IOS 12.0 to 12.4 might allow remote attackers to execute arbitrary code via a heap-based buffer overflow in system timers. NOTE: this issue does not correspond to a specific vulnerability, rather a general weakness that only increases the feasibility of exploitation of any vulnerabilities that might exist. Such design-level weaknesses normally are not included in CVE, so perhaps this issue should be REJECTed.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/17413
- http://securitytracker.com/id?1015139=
- http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml
- http://www.kb.cert.org/vuls/id/562945
- http://www.securityfocus.com/bid/15275
- http://www.vupen.com/english/advisories/2005/2282
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4914
- http://secunia.com/advisories/17413
- http://securitytracker.com/id?1015139=
- http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml
- http://www.kb.cert.org/vuls/id/562945
- http://www.securityfocus.com/bid/15275
- http://www.vupen.com/english/advisories/2005/2282
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4914



