mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
461 lines
24 KiB
JSON
461 lines
24 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"DATE_PUBLIC": "2019-03-27T16:00:00-0700",
|
|
"ID": "CVE-2019-1746",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco IOS and IOS XE Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.0SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.1SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.2SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.3SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.4SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.5SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.6SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.7SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.8SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.9SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.10SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.2.11SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.0SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.2SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.1SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.0XO"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.1XO"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.2XO"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.0SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.2SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.1SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.3SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.4SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.5SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.6SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.7SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.8SG"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.2E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.3E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.4S"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.12.0aS"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.0aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.0bE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.2aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.2E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.3E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.4E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.5E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.6E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.5aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.5bE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.7E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.8E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.7aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.7bE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.9E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.6.10E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.0SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.1SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.0SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.4.1SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.2E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.3E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.4E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.7.5E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.0SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.1SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.2SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.3SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.4SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.5SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.6SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.7SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.5.8SQ"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.16.1S"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.16.0bS"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.16.10S"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.2E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.3E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.4E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.5E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.5aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.6E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.8.7E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.9.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.9.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.9.2E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.9.2bE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "16.9.2h"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.0E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.1E"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.0cE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.1aE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.10.1sE"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "16.12.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Cisco"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
|
|
}
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "7.4",
|
|
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
|
|
"refsource": "CISCO",
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
|
|
},
|
|
{
|
|
"refsource": "BID",
|
|
"name": "107612",
|
|
"url": "http://www.securityfocus.com/bid/107612"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-20190327-cmp-dos",
|
|
"defect": [
|
|
[
|
|
"CSCvj25068",
|
|
"CSCvj25124"
|
|
]
|
|
],
|
|
"discovery": "INTERNAL"
|
|
}
|
|
} |