The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.
Advisories
Source ID Title
EUVD EUVD EUVD-2013-1187 The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-09-16T17:28:14.226Z

Reserved: 2013-01-11T00:00:00Z

Link: CVE-2013-1147

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-03-28T23:55:01.627

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-1147

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses