Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2006-1927
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cisco IOS XR, when configured for Multi Protocol Label Switching (MPLS) and running on Cisco CRS-1 or Cisco 12000 series routers, allows remote attackers to cause a denial of service (Line card crash) via certain MPLS packets, as identified by Cisco bug ID CSCsc77475.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco IOS XR MPLS拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco IOS XR软件是Cisco IOS软件家族的成员,使用基于微内核的分布式操作系统基础架构。Cisco IOS XR运行在Cisco CRS-1和Cisco 12000系列路由器上。 Cisco CRS-1或12000系列系统交换的特殊MPLS报文会导致NetIO进程重启。如果NetIO进程连续几次重启,线卡就会重载,导致该线卡所交换的通讯拒绝服务。 MPLS报文通过MPLS网络转发,因此可以从MPLS网络中的远程系统发送触发这个漏洞的报文。无法在没有配置MPLS的接口上接收这样的报文。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2006-1927
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2006-1927
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2006-1927

No comments yet


Leave a comment