mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
146 lines
5.6 KiB
JSON
146 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2017-3857",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2017-03-22T19:59:00.307",
|
|
"lastModified": "2020-07-27T16:59:48.603",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the Layer 2 Tunneling Protocol (L2TP) parsing function of Cisco IOS (12.0 through 12.4 and 15.0 through 15.6) and Cisco IOS XE (3.1 through 3.18) could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of L2TP packets. An attacker could exploit this vulnerability by sending a crafted L2TP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or Cisco IOS XE Software if the L2TP feature is enabled for the device and the device is configured as an L2TP Version 2 (L2TPv2) or L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not enabled. Cisco Bug IDs: CSCuy82078."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en la funci\u00f3n de an\u00e1lisis en Layer 2 Tunneling Protocol (L2TP) de Cisco IOS (12.0 en versiones hasta 12.4 y 15.0 en versiones hasta 15.6) y Cisco IOS XE (3.1 en versiones hasta 3.18) podr\u00eda permitir a un atacante remoto no autenticado provocar recarga de los dispositivo afectado. La vulnerabilidad se debe a la insuficiente validaci\u00f3n de los paquetes L2TP. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacer que el dispositivo afectado se vuelva a cargar, dando como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad afecta a los dispositivos Cisco que ejecutan una versi\u00f3n vulnerable de Cisco IOS o Cisco IOS XE Software si la caracter\u00edstica L2TP est\u00e1 habilitada para el dispositivo y el dispositivo est\u00e1 configurado como punto final L2TP Versi\u00f3n 2 (L2TPv2) o L2TP Versi\u00f3n 3 (L2TPv3). De forma predeterminada, la funci\u00f3n L2TP no est\u00e1 habilitada. ID de bugs de Cisco: CSCuy82078."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.0",
|
|
"versionEndIncluding": "12.4",
|
|
"matchCriteriaId": "63ACD7DB-DCFE-4CDB-A3F0-4E413E178315"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0",
|
|
"versionEndIncluding": "15.6",
|
|
"matchCriteriaId": "650EB42C-D85F-482B-972D-7DCAC210DC48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.1.0",
|
|
"versionEndIncluding": "3.18.0",
|
|
"matchCriteriaId": "5A2C5C45-AFB0-4739-81F6-C56B745DC670"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/97010",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1038100",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"VDB Entry"
|
|
]
|
|
}
|
|
]
|
|
} |