cve/2013/CVE-2013-0149.md

18 lines
994 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-0149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
### POC
#### Reference
- http://www.kb.cert.org/vuls/id/229804
#### Github
No PoCs found on GitHub currently.