René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
5.1 KiB
JSON

{
"id": "CVE-2015-0608",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2015-02-12T01:59:25.047",
"lastModified": "2017-09-08T01:29:46.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en la implementaci\u00f3n Measurement, Aggregation, y Correlation Engine (MACE) en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de trafico manipulado de la red que provoca el manejo incorrecto delos tiempos de la conmutaci\u00f3n de procesos y de la conmutaci\u00f3n de Cisco Express Forwarding (CEF), tambi\u00e9n conocido como Bug ID CSCul48736."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"versionEndIncluding": "15.4\\(2\\)t3",
"matchCriteriaId": "0BB41B33-9B9A-4204-AE52-7E92539877BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:*",
"matchCriteriaId": "512D35A9-14FB-4797-88F1-AAE6F1232057"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37421",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72566",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031731",
"source": "ykramarz@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100808",
"source": "ykramarz@cisco.com"
}
]
}