Vulnerability Details : CVE-2008-3811
Cisco IOS 12.2 and 12.4, when NAT Skinny Call Control Protocol (SCCP) Fragmentation Support is enabled, allows remote attackers to cause a denial of service (device reload) via segmented SCCP messages, aka Cisco Bug ID CSCsi17020, a different vulnerability than CVE-2008-3810.
Published 2008-09-26 16:21:44
Updated 2017-09-29 01:31:52
Vulnerability category: Input validation Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2008-3811
Probability of exploitation activity in the next 30 days EPSS Score History
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3811
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
CWE ids for CVE-2008-3811
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3811
Products affected by CVE-2008-3811
Cisco » IOS » Version: 12.4mr
cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4t
cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xc
cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xe
cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xg
cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xj
cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4sw
cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xp
cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xt
cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xf
cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xl
cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xm
cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xn
cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xv
cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xw
cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4md
cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*
Cisco » IOS » Version: 12.4xk
cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*
SecurityScorecard
1140 Avenue of the Americas
19th Floor
New York, NY 10036
info@securityscorecard.io
United States: (800) 682-1707
International: +1(646) 809-2166
This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD website for more information. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!