René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

267 lines
9.6 KiB
JSON

{
"id": "CVE-2016-6379",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2016-10-05T20:59:02.977",
"lastModified": "2017-07-30T01:29:10.227",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.2 and IOS XE 3.14 through 3.16 and 16.1 allow remote attackers to cause a denial of service (device reload) via crafted IP Detail Record (IPDR) packets, aka Bug ID CSCuu35089."
},
{
"lang": "es",
"value": "Cisco IOS 12.2 e IOS XE 3.14 hasta la versi\u00f3n 3.16 y 16.1 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de paquetes IP Detail Record (IPDR) manipulados, vulnerabilidad tambi\u00e9n conocida como Bug ID CSCuu35089."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)cx:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4767D1-901D-407E-93A1-16FB664625DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)cy:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0C5579-1AA6-4349-9AD3-76FD5A0B718B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)cy1:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF2190B-7C8D-488A-8F6C-4A42D09663F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0B3338-E4D5-4095-8974-71E53C331994"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch0a:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFF438B-7F65-44A8-BF90-A097A4A44F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch1:*:*:*:*:*:*:*",
"matchCriteriaId": "F0597C3A-B04E-4E9F-97C7-EC0E42D78DC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF83DC52-FDEE-4E97-BB36-31EF62288FE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch2a:*:*:*:*:*:*:*",
"matchCriteriaId": "3AB1EE42-D488-4394-95A3-03028CFFA221"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch3:*:*:*:*:*:*:*",
"matchCriteriaId": "F47A48B7-7BA9-42BA-828B-94715C72CAAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch4:*:*:*:*:*:*:*",
"matchCriteriaId": "437487D2-21F6-4040-B089-801289F1726F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch5:*:*:*:*:*:*:*",
"matchCriteriaId": "6820C62D-C013-4792-91B5-6CFBC199C4B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB86B21C-E12A-4ED7-93EC-6EAC3F3B85F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sci:*:*:*:*:*:*:*",
"matchCriteriaId": "6429A720-E5FA-4D55-B7A5-ABECF7315F64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sci1:*:*:*:*:*:*:*",
"matchCriteriaId": "F711597B-2972-4E92-93EC-14B680B3E48D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sci1a:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6A802D-F4D3-4D97-8937-D47C2723A64F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sci3:*:*:*:*:*:*:*",
"matchCriteriaId": "193415A6-6E8B-49AD-84A8-8F944360A617"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93205",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
"source": "ykramarz@cisco.com"
}
]
}