108 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2014-3276",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-05-26T00:25:31.470",
"lastModified": "2016-09-07T17:01:21.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cisco Identity Services Engine (ISE) 1.2(.1 patch 2) and earlier does not properly handle deadlock conditions during reception of crafted RADIUS accounting packets from multiple NAS devices, which allows remote authenticated users to cause a denial of service (RADIUS outage) by sourcing these packets from two origins, aka Bug ID CSCuo56780."
},
{
"lang": "es",
"value": "Cisco Identity Services Engine (ISE) 1.2(.1 patch 2) y anteriores no maneja debidamente condiciones de bloqueo durante la recepci\u00f3n de paquetes de contabilidad RADIUS manipulados de m\u00faltiples dispositivos NAS, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (RADIUS outage) mediante la obtenci\u00f3n de estos paquetes de dos origines, tambi\u00e9n conocido como Bug ID CSCuo56780."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "63BC1BB0-33FB-4CBC-99AD-E9E6593B2A11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:identity_services_engine_software:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA49BB84-9E6B-4510-B2DF-178C2E6C0CBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:identity_services_engine_software:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "50CE032F-3BD1-462D-B2DD-4088EA7CE037"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3276",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34329",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030274",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}