mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
258 lines
9.5 KiB
JSON
258 lines
9.5 KiB
JSON
{
|
|
"id": "CVE-2014-2113",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2014-03-27T21:55:09.110",
|
|
"lastModified": "2024-11-21T02:05:40.570",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco IOS 15.1 through 15.3 and IOS XE 3.3 and 3.5 before 3.5.2E; 3.7 before 3.7.5S; and 3.8, 3.9, and 3.10 before 3.10.2S allow remote attackers to cause a denial of service (I/O memory consumption and device reload) via a malformed IPv6 packet, aka Bug ID CSCui59540."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco IOS 15.1 hasta 15.3 y IOS XE 3.3 y 3.5 anterior a 3.5.2E; 3.7 anterior a 3.7.5S y 3.8, 3.9 y 3.10 anterior a 3.10.2S permiten a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria de E/S y reinicio de dispositivo) a trav\u00e9s de un paquete IPv6 malformado, tambi\u00e9n conocido como Bug ID CSCui59540."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"baseScore": 7.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B870F917-9F35-41AE-8CCA-D8574189C7EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "737D7668-872C-4246-9AB9-12FF059E231A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41E237F6-97DA-45AE-8505-B3F629AB026D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF78C82D-B8A9-47F6-983B-4F315024981D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE97CB97-258C-40DD-8596-1BBD70FF0AC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DD097AB-515E-4F59-9BE1-EABC05B65661"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86947E54-A1B9-4ECE-92A6-417462249612"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A862D914-CE60-48A9-9D52-299642BE3FF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E585F9A7-3693-44EF-BBF9-9EA0EBCC1526"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "414646EA-063D-41F4-8EA9-4B69559EE700"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B3BC6AA-59AA-473F-99BC-30A91553A204"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s\\(.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "274A45E0-F556-4AFB-9050-BE99DE308206"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s\\(.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34F50A18-1849-4205-A553-3F16CDA39850"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B79934A-7B54-46F7-AD4F-C7756D647633"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D50BF2F7-363D-434C-8F5E-0D05F93E99BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84435710-504F-4838-A488-FB1218D5111F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A10EA18-B637-4792-A3CB-E29705893148"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9D9F45C-E71F-4425-A0C7-DFFEEC93C152"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1610738B-DA92-4368-868C-F8DD6C7DC0E4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/66467",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/66467",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |