diff --git a/2019/1xxx/CVE-2019-1746.json b/2019/1xxx/CVE-2019-1746.json index c5cf802ae33..016ff0bb911 100644 --- a/2019/1xxx/CVE-2019-1746.json +++ b/2019/1xxx/CVE-2019-1746.json @@ -1,8 +1,402 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-03-27T16:00:00-0700", "ID": "CVE-2019-1746", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco IOS and IOS XE Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.2.0SG" + }, + { + "version_affected": "=", + "version_value": "3.2.1SG" + }, + { + "version_affected": "=", + "version_value": "3.2.2SG" + }, + { + "version_affected": "=", + "version_value": "3.2.3SG" + }, + { + "version_affected": "=", + "version_value": "3.2.4SG" + }, + { + "version_affected": "=", + "version_value": "3.2.5SG" + }, + { + "version_affected": "=", + "version_value": "3.2.6SG" + }, + { + "version_affected": "=", + "version_value": "3.2.7SG" + }, + { + "version_affected": "=", + "version_value": "3.2.8SG" + }, + { + "version_affected": "=", + "version_value": "3.2.9SG" + }, + { + "version_affected": "=", + "version_value": "3.2.10SG" + }, + { + "version_affected": "=", + "version_value": "3.2.11SG" + }, + { + "version_affected": "=", + "version_value": "3.3.0SG" + }, + { + "version_affected": "=", + "version_value": "3.3.2SG" + }, + { + "version_affected": "=", + "version_value": "3.3.1SG" + }, + { + "version_affected": "=", + "version_value": "3.3.0XO" + }, + { + "version_affected": "=", + "version_value": "3.3.1XO" + }, + { + "version_affected": "=", + "version_value": "3.3.2XO" + }, + { + "version_affected": "=", + "version_value": "3.4.0SG" + }, + { + "version_affected": "=", + "version_value": "3.4.2SG" + }, + { + "version_affected": "=", + "version_value": "3.4.1SG" + }, + { + "version_affected": "=", + "version_value": "3.4.3SG" + }, + { + "version_affected": "=", + "version_value": "3.4.4SG" + }, + { + "version_affected": "=", + "version_value": "3.4.5SG" + }, + { + "version_affected": "=", + "version_value": "3.4.6SG" + }, + { + "version_affected": "=", + "version_value": "3.4.7SG" + }, + { + "version_affected": "=", + "version_value": "3.4.8SG" + }, + { + "version_affected": "=", + "version_value": "3.5.0E" + }, + { + "version_affected": "=", + "version_value": "3.5.1E" + }, + { + "version_affected": "=", + "version_value": "3.5.2E" + }, + { + "version_affected": "=", + "version_value": "3.5.3E" + }, + { + "version_affected": "=", + "version_value": "3.10.4S" + }, + { + "version_affected": "=", + "version_value": "3.12.0aS" + }, + { + "version_affected": "=", + "version_value": "3.6.0E" + }, + { + "version_affected": "=", + "version_value": "3.6.1E" + }, + { + "version_affected": "=", + "version_value": "3.6.0aE" + }, + { + "version_affected": "=", + "version_value": "3.6.0bE" + }, + { + "version_affected": "=", + "version_value": "3.6.2aE" + }, + { + "version_affected": "=", + "version_value": "3.6.2E" + }, + { + "version_affected": "=", + "version_value": "3.6.3E" + }, + { + "version_affected": "=", + "version_value": "3.6.4E" + }, + { + "version_affected": "=", + "version_value": "3.6.5E" + }, + { + "version_affected": "=", + "version_value": "3.6.6E" + }, + { + "version_affected": "=", + "version_value": "3.6.5aE" + }, + { + "version_affected": "=", + "version_value": "3.6.5bE" + }, + { + "version_affected": "=", + "version_value": "3.6.7E" + }, + { + "version_affected": "=", + "version_value": "3.6.8E" + }, + { + "version_affected": "=", + "version_value": "3.6.7aE" + }, + { + "version_affected": "=", + "version_value": "3.6.7bE" + }, + { + "version_affected": "=", + "version_value": "3.6.9E" + }, + { + "version_affected": "=", + "version_value": "3.6.10E" + }, + { + "version_affected": "=", + "version_value": "3.3.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.3.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.4.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.4.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.7.0E" + }, + { + "version_affected": "=", + "version_value": "3.7.1E" + }, + { + "version_affected": "=", + "version_value": "3.7.2E" + }, + { + "version_affected": "=", + "version_value": "3.7.3E" + }, + { + "version_affected": "=", + "version_value": "3.7.4E" + }, + { + "version_affected": "=", + "version_value": "3.7.5E" + }, + { + "version_affected": "=", + "version_value": "3.5.0SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.1SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.2SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.3SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.4SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.5SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.6SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.7SQ" + }, + { + "version_affected": "=", + "version_value": "3.5.8SQ" + }, + { + "version_affected": "=", + "version_value": "3.16.1S" + }, + { + "version_affected": "=", + "version_value": "3.16.0bS" + }, + { + "version_affected": "=", + "version_value": "3.16.10S" + }, + { + "version_affected": "=", + "version_value": "3.8.0E" + }, + { + "version_affected": "=", + "version_value": "3.8.1E" + }, + { + "version_affected": "=", + "version_value": "3.8.2E" + }, + { + "version_affected": "=", + "version_value": "3.8.3E" + }, + { + "version_affected": "=", + "version_value": "3.8.4E" + }, + { + "version_affected": "=", + "version_value": "3.8.5E" + }, + { + "version_affected": "=", + "version_value": "3.8.5aE" + }, + { + "version_affected": "=", + "version_value": "3.8.6E" + }, + { + "version_affected": "=", + "version_value": "3.8.7E" + }, + { + "version_affected": "=", + "version_value": "3.9.0E" + }, + { + "version_affected": "=", + "version_value": "3.9.1E" + }, + { + "version_affected": "=", + "version_value": "3.9.2E" + }, + { + "version_affected": "=", + "version_value": "3.9.2bE" + }, + { + "version_affected": "=", + "version_value": "16.9.2h" + }, + { + "version_affected": "=", + "version_value": "3.10.0E" + }, + { + "version_affected": "=", + "version_value": "3.10.1E" + }, + { + "version_affected": "=", + "version_value": "3.10.0cE" + }, + { + "version_affected": "=", + "version_value": "3.10.1aE" + }, + { + "version_affected": "=", + "version_value": "3.10.1sE" + }, + { + "version_affected": "=", + "version_value": "16.12.1" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,8 +405,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically. " } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "7.4", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190327-cmp-dos", + "defect": [ + [ + "CSCvj25068", + "CSCvj25124" + ] + ], + "discovery": "INTERNAL" } -} \ No newline at end of file +}