{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" }, { "name": "12117", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12117" }, { "name": "10768", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10768" }, { "name": "VU#277048", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/277048" }, { "name": "cisco-ons-tcp-ack-dos(16763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16763" } ] } }