Vulnerabilites related to cisco - catalyst_3750-x
Vulnerability from fkie_nvd
Published
2013-02-13 23:55
Modified
2024-11-21 01:48
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*", matchCriteriaId: "23F65F67-4C3B-42A2-ACD7-4590FF3125E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*", matchCriteriaId: "7DBBC2D9-67D3-47FB-A627-7703A5440B34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*", matchCriteriaId: "85876B6F-DE52-4FC2-85E9-3639B2894A90", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*", matchCriteriaId: "E38034CB-72FD-4E96-A3E3-0B555EC54A7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*", matchCriteriaId: "5C3745E0-4918-40AD-A219-111DC81CF766", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*", matchCriteriaId: "643219DD-5795-48F9-899D-19A27A614F90", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2900xl:*:*:*:*:*:*:*:*", matchCriteriaId: "608C95E6-75D1-4A04-83B4-F9785CD25F79", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*", matchCriteriaId: "59B7C906-927C-4B8B-9FA2-F93CF4DB6023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*", matchCriteriaId: "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*", matchCriteriaId: "26EAFC2E-8385-4A04-A761-EC54011A333C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*", matchCriteriaId: "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*", matchCriteriaId: "88256AC6-6E27-40E6-9714-398DEF763D78", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*", matchCriteriaId: "9D23DF01-93A7-46AD-8B09-963BCC02EB57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*", matchCriteriaId: "E61F8C4A-1B97-4550-A465-3157A51E5D04", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*", matchCriteriaId: "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*", matchCriteriaId: "5388120C-0B85-4029-9A6C-EFFD282F23EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*", matchCriteriaId: "36A8A4B8-423D-4366-8F6D-521A7120E0E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*", matchCriteriaId: "B539EED0-16A3-4F4F-8791-F90FDA13520B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2948g:*:*:*:*:*:*:*:*", matchCriteriaId: "B8F5796A-1E96-46DE-8B46-B46140D65A07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*", matchCriteriaId: "C8BF525D-E813-4CB9-BE84-0B8283F2FACF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*", matchCriteriaId: "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*", matchCriteriaId: "EC79C1CD-FC2D-4667-A92E-8C87ECE04128", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*", matchCriteriaId: "15CC7BDB-8C89-43AB-A514-8FC23092DE4B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*", matchCriteriaId: "7CFE777F-AC93-4598-A406-C437BB1FFCE3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*", matchCriteriaId: "E67B901F-1FF8-4B04-ADBB-66606F20A70B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*", matchCriteriaId: "3DC0577E-8CCC-4D3A-8536-61577BFA16D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*", matchCriteriaId: "1354FE59-7DB1-4CFE-9149-40EA1CE7B000", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*", matchCriteriaId: "B7C96219-7521-4F11-A222-9BCAB0B9B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3500:*:*:*:*:*:*:*:*", matchCriteriaId: "DD6B51E6-ABEF-4E22-B0D0-692D76784B95", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*", matchCriteriaId: "DA122273-0B84-4CE6-AAF6-F89E1F986C33", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3500xl:*:*:*:*:*:*:*:*", matchCriteriaId: "9229CAAE-1582-43DE-B727-881D0E3ABB9A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*", matchCriteriaId: "1DA518E9-3A63-4997-AC3E-2FB0B8438B82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", matchCriteriaId: "83227C65-2708-4974-BDCE-07F9849CC921", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*", matchCriteriaId: "84DD0996-8EF3-4845-8171-3053A4505213", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*", matchCriteriaId: "838B730D-D40C-4CBA-ABCE-BD4F4478D75F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", matchCriteriaId: "CF73F5A9-F3FB-476D-8309-B1E1E485C44A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*", matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", matchCriteriaId: "BC517907-C094-4B7F-8073-480DE18CDD75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*", matchCriteriaId: "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*", matchCriteriaId: "04831AE8-B21E-4674-AD14-9E98AF50D250", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*", matchCriteriaId: "105544F7-F57E-4B22-921C-E5EEA82B5CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*", matchCriteriaId: "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*", matchCriteriaId: "8348B895-7B3F-40CB-8843-02DBD28FC6F4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*", matchCriteriaId: "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*", matchCriteriaId: "E27A63C6-255D-449F-B00B-4EB4060ED7E0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*", matchCriteriaId: "8C88A18B-2949-4D54-8B78-61418C1DD3E8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*", matchCriteriaId: "50E25997-76B2-46FF-8426-8F40002BEE78", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*", matchCriteriaId: "23267E55-E098-41F5-9B9A-E1919214B579", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*", matchCriteriaId: "324DE8A5-FA75-4758-8775-65051504259F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*", matchCriteriaId: "843C8691-3CB5-4C7E-A6C0-47625387CF33", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*", matchCriteriaId: "16867F98-C635-4507-B5A9-BD19181B1E67", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*", matchCriteriaId: "83198D7C-C205-44AF-901F-6BD6D5C36244", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*", matchCriteriaId: "A3021C2B-3E4B-4E81-9725-F75EA7635EED", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*", matchCriteriaId: "8473D554-26FD-4D38-92FC-EE3EE2F3D30A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*", matchCriteriaId: "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_5500:*:*:*:*:*:*:*:*", matchCriteriaId: "3645D147-C584-48AD-9FFD-7D7401342555", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*", matchCriteriaId: "F131955B-CDE7-48BC-9F64-E56BC90F2695", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*", matchCriteriaId: "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*", matchCriteriaId: "4B75201F-F007-4612-A3F0-ABC75C730F94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "0BF0BBC8-04BD-4867-B188-35461E50FF16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "C959C93D-D58C-4AB5-9058-0CF257C68F72", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*", matchCriteriaId: "F202892E-2E58-4D77-B983-38AFA51CDBC6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0BE25114-ABBC-47A0-9C20-E8D40D721313", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*", matchCriteriaId: "FADD5F49-2817-40EC-861C-C922825708BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E628F9C4-98C6-4A95-AF81-F1E6A56E8648", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4AFF899C-1EB3-46D8-9003-EA36A68C90B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*", matchCriteriaId: "E6463491-F63E-44CB-A1D4-C029BE7D3D3D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D8668D34-096B-4FC3-B9B1-0ECFD6265778", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*", matchCriteriaId: "3F918F12-DC72-45B0-B776-3F744F12F3D0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*", matchCriteriaId: "8DD2CF99-7556-427B-BCE5-980BBADC4294", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", matchCriteriaId: "C8D63186-5834-448C-98F2-0C189A11D25D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*", matchCriteriaId: "57BAA00D-994D-4F18-9858-7EAC3470FBC0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*", matchCriteriaId: "793FC8D9-A500-4D21-858F-97CE380C3774", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*", matchCriteriaId: "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*", matchCriteriaId: "F2C0C970-2EB3-489A-AFA5-3066B78D2A32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*", matchCriteriaId: "CCA10A45-3421-48A0-82D7-1605641E0AAC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*", matchCriteriaId: "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.", }, { lang: "es", value: "El servidor HTTP en Cisco IOS en switches Catalyst no trata correctamente los eventos socket TCP, lo que permite a atacantes remotos provocar una denegación de servicio (caída de dispositivo) a través de paquetes hechos a mano en el puerto TCP (1) 80 o (2) 443, también conocido como Bug ID CSCuc53853.", }, ], id: "CVE-2013-1100", lastModified: "2024-11-21T01:48:54.600", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 5.4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-02-13T23:55:01.117", references: [ { source: "ykramarz@cisco.com", url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2013-10-25 03:52
Modified
2024-11-21 01:57
Severity ?
Summary
Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | - | |
cisco | catalyst_3750-x | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*", matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.", }, { lang: "es", value: "Cisco IOS en el switches Catalyst 3750X tiene por defecto credenciales de Service Module, lo que hace que sea más fácil para los usuarios locales conseguir privilegios a través de un inicio de sesión de un Service Module, también conocido como Bug ID CSCue92286.", }, ], id: "CVE-2013-5522", lastModified: "2024-11-21T01:57:38.030", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.1, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-10-25T03:52:54.970", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2012-08-06 17:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 15.0 | |
cisco | ios | 15.1 | |
cisco | catalyst_3560 | * | |
cisco | catalyst_3560-e | * | |
cisco | catalyst_3560-x | * | |
cisco | catalyst_3750 | * | |
cisco | catalyst_3750-e | * | |
cisco | catalyst_3750-x | * | |
cisco | catalyst_3750_metro | * | |
cisco | catalyst_3750g | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", matchCriteriaId: "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", matchCriteriaId: "EB41294E-F3DF-4F1E-A4C8-E90B21A88836", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", matchCriteriaId: "83227C65-2708-4974-BDCE-07F9849CC921", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*", matchCriteriaId: "84DD0996-8EF3-4845-8171-3053A4505213", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*", matchCriteriaId: "838B730D-D40C-4CBA-ABCE-BD4F4478D75F", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", matchCriteriaId: "CF73F5A9-F3FB-476D-8309-B1E1E485C44A", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*", matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", matchCriteriaId: "BC517907-C094-4B7F-8073-480DE18CDD75", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*", matchCriteriaId: "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.", }, { lang: "es", value: "Cisco IOS v15.0 y v15.1 en el Catalyst 3560 y 3750 switches de la serie permite a usuarios remotos autenticados provocar una denegación de servicio (recarga del dispositivo) al completar la autenticación web local con rapidez, también conocido como Bug ID CSCts88664.", }, ], id: "CVE-2012-1338", lastModified: "2024-11-21T01:36:49.953", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2012-08-06T17:55:00.697", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", }, { source: "ykramarz@cisco.com", url: "http://www.securitytracker.com/id?1027349", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1027349", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2012-1338
Vulnerability from cvelistv5
Published
2012-08-06 17:00
Modified
2024-08-06 18:53
Severity ?
EPSS score ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1027349 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T18:53:37.171Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1027349", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1027349", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2012-06-01T00:00:00", descriptions: [ { lang: "en", value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-03-30T09:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "1027349", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1027349", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2012-1338", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1027349", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1027349", }, { name: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", refsource: "CONFIRM", url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2012-1338", datePublished: "2012-08-06T17:00:00", dateReserved: "2012-02-27T00:00:00", dateUpdated: "2024-08-06T18:53:37.171Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-1100
Vulnerability from cvelistv5
Published
2013-02-13 23:00
Modified
2024-09-16 18:14
Severity ?
EPSS score ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T14:49:20.711Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-02-13T23:00:00Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2013-1100", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2013-1100", datePublished: "2013-02-13T23:00:00Z", dateReserved: "2013-01-11T00:00:00Z", dateUpdated: "2024-09-16T18:14:13.971Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-5522
Vulnerability from cvelistv5
Published
2013-10-25 01:00
Modified
2024-09-16 19:36
Severity ?
EPSS score ?
Summary
Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T17:15:20.869Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-10-25T01:00:00Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2013-5522", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2013-5522", datePublished: "2013-10-25T01:00:00Z", dateReserved: "2013-08-22T00:00:00Z", dateUpdated: "2024-09-16T19:36:51.259Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }