All the vulnerabilites related to cisco - network_convergence_system_6000
cve-2015-0618
Vulnerability from cvelistv5
Published
2015-02-21 11:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/72713 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1031778 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "72713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72713" }, { "name": "1031778", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031778" }, { "name": "20150220 Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-26T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "72713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72713" }, { "name": "1031778", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031778" }, { "name": "20150220 Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "72713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72713" }, { "name": "1031778", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031778" }, { "name": "20150220 Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0618", "datePublished": "2015-02-21T11:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1426
Vulnerability from cvelistv5
Published
2016-07-15 16:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/91748 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1036295 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91748" }, { "name": "20160713 Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k" }, { "name": "1036295", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036295" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "91748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91748" }, { "name": "20160713 Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k" }, { "name": "1036295", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036295" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91748", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91748" }, { "name": "20160713 Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k" }, { "name": "1036295", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036295" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1426", "datePublished": "2016-07-15T16:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3379
Vulnerability from cvelistv5
Published
2014-09-20 10:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (NPU and card hang or reload) via a malformed MPLS packet, aka Bug ID CSCuq10466.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/viewAlert.x?alertId=35776 | x_refsource_CONFIRM | |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379 | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1030878 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/61372 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/69960 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96068 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:05.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776" }, { "name": "20140918 Cisco IOS XR Software Malformed MPLS Packet Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379" }, { "name": "1030878", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030878" }, { "name": "61372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61372" }, { "name": "69960", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69960" }, { "name": "ciscoiosxr-cve20143379-dos(96068)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (NPU and card hang or reload) via a malformed MPLS packet, aka Bug ID CSCuq10466." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776" }, { "name": "20140918 Cisco IOS XR Software Malformed MPLS Packet Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379" }, { "name": "1030878", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030878" }, { "name": "61372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61372" }, { "name": "69960", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69960" }, { "name": "ciscoiosxr-cve20143379-dos(96068)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-3379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (NPU and card hang or reload) via a malformed MPLS packet, aka Bug ID CSCuq10466." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776" }, { "name": "20140918 Cisco IOS XR Software Malformed MPLS Packet Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379" }, { "name": "1030878", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030878" }, { "name": "61372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61372" }, { "name": "69960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69960" }, { "name": "ciscoiosxr-cve20143379-dos(96068)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-3379", "datePublished": "2014-09-20T10:00:00", "dateReserved": "2014-05-07T00:00:00", "dateUpdated": "2024-08-06T10:43:05.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2016-07-15 16:59
Modified
2024-11-21 02:46
Severity ?
Summary
Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | network_convergence_system_6000 | - | |
cisco | ios_xr | 5.0.0 | |
cisco | ios_xr | 5.0.1 | |
cisco | ios_xr | 5.0_base | |
cisco | ios_xr | 5.1.0 | |
cisco | ios_xr | 5.1.1 | |
cisco | ios_xr | 5.1.1.k9sec | |
cisco | ios_xr | 5.1.2 | |
cisco | ios_xr | 5.1.3 | |
cisco | ios_xr | 5.2.0 | |
cisco | ios_xr | 5.2.1 | |
cisco | ios_xr | 5.2.2 | |
cisco | ios_xr | 5.2.3 | |
cisco | ios_xr | 5.2.4 | |
cisco | ios_xr | 5.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:network_convergence_system_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC9F2F14-8466-4093-9FB2-2831BDDF9C2E", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7620A88-C4B3-4184-846F-1E3FD8A751EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "96BFB5A5-EF04-4334-9A62-558A375DE768", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "E833219C-7887-4A1C-B616-CDB1AFD7A366", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9839DC3C-8B8A-49D5-9E50-BB7C4BCE5878", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "12A14B46-0EC9-4FE4-AD28-F0F7861465B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.1.k9sec:*:*:*:*:*:*:*", "matchCriteriaId": "C754F1D8-81E5-45BB-A4E1-1F9D773F2979", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61C1B066-9DED-46D7-9DF7-AB55DF01B80F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "53E2D669-70EA-455E-BC9C-E97065502DD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DFA18-E6D7-4F1D-8D9B-70323B2983AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "95175A2E-14DB-4730-93EA-2291ED7E0DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB5452CA-E4DF-49FD-A677-3F6257F14707", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E5EFC65A-C469-4267-9C0B-DD25E2E8C0F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7DABC2A4-B161-4597-B053-0ECEFCCDD89F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A0B5C0F4-1BEC-4B54-ABF0-948CFF80E5E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819." }, { "lang": "es", "value": "Cisco IOS XR 5.x hasta la versi\u00f3n 5.2.5 en dispositivos NCS 6000 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo del temporizador y recarga de Route Processor) a trav\u00e9s de tr\u00e1fico SSH manipulado, tambi\u00e9n conocido como Bug ID CSCux76819." } ], "id": "CVE-2016-1426", "lastModified": "2024-11-21T02:46:25.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-15T16:59:00.157", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/91748" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1036295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036295" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-20 10:55
Modified
2024-11-21 02:07
Severity ?
Summary
Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (NPU and card hang or reload) via a malformed MPLS packet, aka Bug ID CSCuq10466.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "778F5573-0741-442F-AFFA-937053F8280C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B4F71CB-B8D6-44AA-B0E8-E6EC92F4273E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADF0D7F5-7A9C-4E58-A9DB-33BF13CE135D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C46BE68F-FFA9-4DF0-B407-1F5576047B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A88B45F0-B1D1-4680-A29E-2C8A167573D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "265062D1-20BB-4B51-9407-AAA8F83A4D08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*", "matchCriteriaId": "9FDF9D75-6713-427F-A65F-1D59911A410B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "20048020-E135-4D94-A2F5-E4279E35C2D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9D038B2-E87A-4008-B317-841E0BCA1477", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E1811B6-737F-407C-8AB0-63E6B031D5AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E140490A-7295-4BCF-A0F5-BD866D7AC3CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "755F8941-9B32-4178-BB42-EA3E2FC69079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "81797938-F953-42BE-B287-AA48B9860AF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "92AED038-C73F-4499-B064-F01D80DB0C64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB7A249B-AF69-47D0-B6DE-968B4CD0BA42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1833DE9-8128-4749-9944-469FFB225E9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5F15240-6323-4766-801A-D887F3EA8A6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99DC1CF-78DC-4E59-98BA-DD84702D6467", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0B9FA754-E3D2-4D80-8F4B-41139973D9FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2252E7B0-9112-4E9E-8CF4-4EC53C630CFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1131A524-AA7A-4C94-9FFE-54546EA7D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "46D1A634-D39C-4305-8915-4AA289FB68EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "99042285-94AC-4C57-8EAA-EE63C678A94A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E752AA9-CC1C-44B6-A916-A3C76A57F05C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "71CBE50E-9BD3-4F74-8C7A-BE4905090EE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "96F48419-AF66-4B50-ACBF-9E38287A64FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB71A24-AA6C-4BAD-BD37-5C191751C9DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A20B6A9-27B7-4F42-B88D-F4AACC9BC24D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "79164FAE-AE31-4DA2-B4C2-7879268BA29E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9B9A223A-7A0A-4E31-B8A1-C809373A799D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1ECAB9C3-9248-4663-ABAE-31FFC969EF3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "10596213-9D2B-48A3-A733-744D41E90419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A07DCCD1-85D5-4ED2-B845-8C6EAC7E9D9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F57421B-F54C-4C50-8B25-AF787E541C5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A865225-6AEA-430D-8DB6-E70F7ED5E547", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5DA73AC0-1CD2-4B6B-940A-DBB0C97E2C09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "39F8B336-0DFA-41CE-9EFF-89A09BBDC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8A1D1B60-C94F-44BF-8194-7758394E31C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E63681-C89F-4569-A52C-B870D48E436C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E593EF3-133A-4E15-9B86-6B451F5C0159", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3BB49EB2-2D99-4C45-80B7-48299A1EBF30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB6ABB63-E2D2-42F7-B648-BF6002D1C05E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "074571B4-65EF-451A-89DC-0797F6E4BFEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D909532E-85F5-4201-8BFF-561A21998D97", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "73D962D3-563F-4CDE-B51D-224D7995FBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "55C35B00-49C6-4913-8673-3A1BB122A103", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9839DC3C-8B8A-49D5-9E50-BB7C4BCE5878", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:network_convergence_system_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC9F2F14-8466-4093-9FB2-2831BDDF9C2E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:network_convergence_system_6008:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A84C11-65AE-4C23-97B1-C6D3BD2E823D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (NPU and card hang or reload) via a malformed MPLS packet, aka Bug ID CSCuq10466." }, { "lang": "es", "value": "Cisco IOS XR 5.1 y anteriores en dispositivos Network Convergence System 6000 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (NPU y ca\u00edda de tarjeta o recarga) a trav\u00e9s de un paquete MPLS malformado, tambi\u00e9n conocido como Bug ID CSCuq10466." } ], "id": "CVE-2014-3379", "lastModified": "2024-11-21T02:07:58.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-20T10:55:05.027", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/61372" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/69960" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1030878" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-21 11:59
Modified
2024-11-21 02:23
Severity ?
Summary
Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios_xr | 5.0.1 | |
cisco | ios_xr | 5.2.1 | |
cisco | network_convergence_system_6000 | * | |
cisco | carrier_routing_system | 5.1.3 | |
cisco | carrier_routing_system | 5.1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "96BFB5A5-EF04-4334-9A62-558A375DE768", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "95175A2E-14DB-4730-93EA-2291ED7E0DFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:network_convergence_system_6000:*:*:*:*:*:*:*:*", "matchCriteriaId": "907D316A-5FAE-4DFC-8FF1-60C87BA06362", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:carrier_routing_system:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F8DF8A05-DA6E-449C-8E06-A4032196DCEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:carrier_routing_system:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E8DDAB0-A852-44F6-8B6F-1757A1B38BEA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241." }, { "lang": "es", "value": "Cisco IOS XR 5.0.1 y 5.2.1 en los dispositivos Network Convergence System (NCS) 6000 y 5.1.3 y 5.1.4 en los dispositivos Carrier Routing System X (CRS-X) permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de tarjeta de l\u00ednea) a trav\u00e9s de paquetes IPv6 malformados con cabeceras de extensiones, tambi\u00e9n conocido como Bug ID CSCuq95241." } ], "id": "CVE-2015-0618", "lastModified": "2024-11-21T02:23:25.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-21T11:59:01.327", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/72713" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031778" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }