All the vulnerabilites related to cisco - catalyst_3750-e
Vulnerability from fkie_nvd
Published
2013-02-13 23:55
Modified
2024-11-21 01:48
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*", "matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*", "matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*", "matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*", "matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*", "matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*", "matchCriteriaId": "643219DD-5795-48F9-899D-19A27A614F90", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "608C95E6-75D1-4A04-83B4-F9785CD25F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*", "matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*", "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*", "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*", "matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*", "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948g:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8F5796A-1E96-46DE-8B46-B46140D65A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*", "matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*", "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3500:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6B51E6-ABEF-4E22-B0D0-692D76784B95", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3500xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9229CAAE-1582-43DE-B727-881D0E3ABB9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", "matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "84DD0996-8EF3-4845-8171-3053A4505213", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "838B730D-D40C-4CBA-ABCE-BD4F4478D75F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*", "matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*", "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*", "matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*", "matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*", "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*", "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*", "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*", "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*", "matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*", "matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*", "matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "3645D147-C584-48AD-9FFD-7D7401342555", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*", "matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E628F9C4-98C6-4A95-AF81-F1E6A56E8648", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6463491-F63E-44CB-A1D4-C029BE7D3D3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*", "matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*", "matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853." }, { "lang": "es", "value": "El servidor HTTP en Cisco IOS en switches Catalyst no trata correctamente los eventos socket TCP, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) a trav\u00e9s de paquetes hechos a mano en el puerto TCP (1) 80 o (2) 443, tambi\u00e9n conocido como Bug ID CSCuc53853." } ], "id": "CVE-2013-1100", "lastModified": "2024-11-21T01:48:54.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-13T23:55:01.117", "references": [ { "source": "ykramarz@cisco.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-06 17:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 15.0 | |
cisco | ios | 15.1 | |
cisco | catalyst_3560 | * | |
cisco | catalyst_3560-e | * | |
cisco | catalyst_3560-x | * | |
cisco | catalyst_3750 | * | |
cisco | catalyst_3750-e | * | |
cisco | catalyst_3750-x | * | |
cisco | catalyst_3750_metro | * | |
cisco | catalyst_3750g | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", "matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "84DD0996-8EF3-4845-8171-3053A4505213", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "838B730D-D40C-4CBA-ABCE-BD4F4478D75F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664." }, { "lang": "es", "value": "Cisco IOS v15.0 y v15.1 en el Catalyst 3560 y 3750 switches de la serie permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (recarga del dispositivo) al completar la autenticaci\u00f3n web local con rapidez, tambi\u00e9n conocido como Bug ID CSCts88664." } ], "id": "CVE-2012-1338", "lastModified": "2024-11-21T01:36:49.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-06T17:55:00.697", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1027349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027349" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-1338
Vulnerability from cvelistv5
Published
2012-08-06 17:00
Modified
2024-08-06 18:53
Severity ?
EPSS score ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1027349 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:53:37.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1027349", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027349" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-30T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1027349", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027349" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-1338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1027349", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027349" }, { "name": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-1338", "datePublished": "2012-08-06T17:00:00", "dateReserved": "2012-02-27T00:00:00", "dateUpdated": "2024-08-06T18:53:37.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1100
Vulnerability from cvelistv5
Published
2013-02-13 23:00
Modified
2024-09-16 18:14
Severity ?
EPSS score ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-13T23:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-1100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-1100", "datePublished": "2013-02-13T23:00:00Z", "dateReserved": "2013-01-11T00:00:00Z", "dateUpdated": "2024-09-16T18:14:13.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }