The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCtn53730.
                
            References
                    | Link | Resource | 
|---|---|
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat | Vendor Advisory | 
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:57
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat - Vendor Advisory | 
Information
                Published : 2013-09-27 10:08
Updated : 2025-04-11 00:51
NVD link : CVE-2013-5479
Mitre link : CVE-2013-5479
CVE.ORG link : CVE-2013-5479
JSON object : View
Products Affected
                cisco
- ios
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
