2024-12-08 03:06:42 +00:00

135 lines
4.4 KiB
JSON

{
"id": "CVE-2013-6692",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2013-11-22T01:55:04.043",
"lastModified": "2024-11-21T01:59:33.900",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS XE 3.8S(.2) and earlier does not properly use a DHCP pool during assignment of an IP address, which allows remote authenticated users to cause a denial of service (device reload) via an AAA packet that triggers an address requirement, aka Bug ID CSCuh04949."
},
{
"lang": "es",
"value": "Cisco IOS XE 3.8S(.2) y anteriores versiones no usan adecuadamente un pool DHCP durante la asignaci\u00f3n de una direcci\u00f3n IP, lo que permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s de un paquete AAA que desencadena la condici\u00f3n de direcci\u00f3n, tambi\u00e9n conocido como Bug ID CSCuh04949."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"baseScore": 6.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8s\\(.2\\)",
"matchCriteriaId": "01D210A1-66FA-4534-8AD6-42B33389CD99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B79934A-7B54-46F7-AD4F-C7756D647633"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D50BF2F7-363D-434C-8F5E-0D05F93E99BF"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6692",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31860",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6692",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31860",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}