René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
4.9 KiB
JSON

{
"id": "CVE-2015-6432",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2016-01-05T02:59:05.427",
"lastModified": "2016-12-07T18:20:24.417",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0, and 5.3.2 does not properly restrict the number of Path Computation Elements (PCEs) for OSPF LSA opaque area updates, which allows remote attackers to cause a denial of service (device reload) via a crafted update, aka Bug ID CSCuw83486."
},
{
"lang": "es",
"value": "Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0 y 5.3.2 no restringe correctamente el n\u00famero de Path Computation Elements (PCEs) para actualizaciones de OSPF LSA opaque area, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una actualizaci\u00f3n manipulada, tambi\u00e9n conocido como Bug ID CSCuw83486."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6ABB63-E2D2-42F7-B648-BF6002D1C05E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "074571B4-65EF-451A-89DC-0797F6E4BFEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7620A88-C4B3-4184-846F-1E3FD8A751EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9839DC3C-8B8A-49D5-9E50-BB7C4BCE5878"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE1DFA18-E6D7-4F1D-8D9B-70323B2983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5452CA-E4DF-49FD-A677-3F6257F14707"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7DABC2A4-B161-4597-B053-0ECEFCCDD89F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F1F85C-B63F-4D6F-9918-4A5E4945B96B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4695DF36-5DC7-430B-8266-BF07FD2E7EFC"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034570",
"source": "ykramarz@cisco.com"
}
]
}