Vulnerability Details : CVE-2008-3811

Cisco IOS 12.2 and 12.4, when NAT Skinny Call Control Protocol (SCCP) Fragmentation Support is enabled, allows remote attackers to cause a denial of service (device reload) via segmented SCCP messages, aka Cisco Bug ID CSCsi17020, a different vulnerability than CVE-2008-3810.

Published 2008-09-26 16:21:44 Updated 2017-09-29 01:31:52 Vulnerability category: Input validation Denial of service

Exploit prediction scoring system (EPSS) score for CVE-2008-3811

Probability of exploitation activity in the next 30 days EPSS Score History Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2008-3811

Access Vector: Network Access Complexity: Low Authentication: None Confidentiality Impact: None Integrity Impact: None Availability Impact: Complete

CWE ids for CVE-2008-3811

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Assigned by: nvd@nist.gov (Primary)

References for CVE-2008-3811

Products affected by CVE-2008-3811

Cisco » IOS » Version: 12.4mr cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4t cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xc cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xe cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xg cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xj cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4sw cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xp cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xt cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xf cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xl cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xm cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xn cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xv cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xw cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4md cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:* Cisco » IOS » Version: 12.4xk cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*

SecurityScorecard
1140 Avenue of the Americas
19th Floor
New York, NY 10036
info@securityscorecard.io
United States: (800) 682-1707
International: +1(646) 809-2166

This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD website for more information. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!