CVE-2013-3464
Vulnerability from cvelistv5
Published
2013-08-12 23:00
Modified
2024-08-06 16:07
Severity ?
Summary
Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.940Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-iosxr-cve20133464-dos(86385)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86385"
          },
          {
            "name": "1028914",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1028914"
          },
          {
            "name": "20130812 Cisco IOS XR Internet Control Message Protocol Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-iosxr-cve20133464-dos(86385)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86385"
        },
        {
          "name": "1028914",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1028914"
        },
        {
          "name": "20130812 Cisco IOS XR Internet Control Message Protocol Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3464",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-iosxr-cve20133464-dos(86385)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86385"
            },
            {
              "name": "1028914",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1028914"
            },
            {
              "name": "20130812 Cisco IOS XR Internet Control Message Protocol Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3464",
    "datePublished": "2013-08-12T23:00:00",
    "dateReserved": "2013-05-06T00:00:00",
    "dateUpdated": "2024-08-06T16:07:37.940Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:2.0\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2ECF2BB-792A-4404-A215-B1DB2EC351DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.0\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5BE827F-37D5-4AEA-A7A0-643BBC035F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.0\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34351F97-D5C7-446A-9AFE-43A0FC976D54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D35DC5F6-17E2-42A3-92D1-A6450869FDDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF7DC75F-39DD-43D0-B95A-60F67E7D49B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E687A336-DC4E-4219-B0F2-F4112DDF2EBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B61EDEF9-F29D-4486-ABD5-BF06DE577053\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF9A754-3EC3-4BC9-B70E-53BFDCAA98A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BADD5764-378D-4DA9-B19B-E913454CECD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.50\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75E061FA-2A57-4430-96E5-96C8DCF409E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CD6ECE7-9AA5-4153-8787-126A1D2E2402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51CD5770-F542-4B52-A6C1-2649DAF24133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC79E535-4B75-4EC8-9BF8-7BC58DDDA240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1DE6FED-BA70-4EAD-8B3B-708DF124B0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC6E1B7D-A751-40B7-AFFB-A32E1D16F1D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C703C75-167A-4CD3-98AF-13BAC15241CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B87670F-099B-4EA2-837E-F4F97D62F81A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13FC1C0B-2B51-4AEE-BCD8-60E568254E46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8575FF94-D3CC-4AFE-940F-E570AEF009C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFAF16A6-79A5-4A38-9D71-8C05E1DDBC6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5988D97E-257C-4F44-923E-1B8F66107231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8859F6B-9D6C-4F00-B795-35097220BD9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5739FA72-A93B-4404-A632-DBC722BE1C0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03C1EB1B-FDFC-434D-B7E5-BCE56A489F3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA237DA2-D325-455B-BE27-33A3EB5F1153\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE75809C-6DF7-4E55-B74A-2806D751F879\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E7DC333-3A5E-4AE0-BBCC-D656C7B1248D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.6_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37318A4A-B022-406F-9CC4-891D3D02C2FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D57DBF79-B665-422F-857E-169A6A836A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"569A99B8-6DEE-44B8-8EBA-E261B981DB2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B092F8-E3BD-4C6A-9AE1-F673602DED83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.7_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ACF4A41-1D8D-4FEA-B139-E6EE77AF2A96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D5414B4-29A3-4231-860A-B9795589A2A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8280975-E4CC-4A14-BF6E-9EB3755F046C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE1E083-4B78-43B9-A569-529B3A210F84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3085D6A-D343-405F-80A9-487D7EF66AEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E77C6388-CCCE-41F4-A33A-10DA2BC72A30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91E5AA67-081B-4B9E-86F1-548B037E0276\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5172436-13E2-48AD-B532-A104725A1DDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76E308B5-5C8A-4CB4-AB0B-62D8C145C017\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F3051BD-FC2C-483D-B867-83349B1413E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44AEDBFC-6823-4B59-91C1-A63A2857450C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D4D1182-92F0-4A27-8014-615CE7536390\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10549A6-4315-4FD5-8800-7819ECA9BDEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E897239-B6AA-4DD9-A948-61B2A133ED41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E101F34E-BBBC-4D9A-A57D-71F02E75D6A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.0_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59150CDC-27BE-4578-B1D6-AAAB2874E20D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F878DD6-A5FF-41CF-A6F0-04730811B7DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46B3A04A-6BD8-454F-A174-F6DF74B3DDD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7292B5A8-F25B-4B9F-ACA2-1F95D2A6245D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.1_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5169C809-B809-4781-A632-F0814C7D7902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDBDFB6F-9B9A-4105-94C2-12A03348B5D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FB55D7D-62E1-4D3B-AEDE-667A64349967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94A240AD-B5C8-4048-B17D-92D162863CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB2B601F-0227-443B-B204-53E06AF6BCFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1B97B75-8754-46C0-A9EE-4306109E9D22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xr:4.3\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1957C15-1A36-4F91-9CDB-8317FDFEFAF1\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347.\"}, {\"lang\": \"es\", \"value\": \"Cisco IOS XR permite a usuarios locales provocar una denegaci\\u00f3n de servicio (corrupci\\u00f3n memoria en Silicon Packet Processor, manipulaci\\u00f3n indebida mutex, y recarga del dispositivo) iniciando una inundaci\\u00f3n a trav\\u00e9s del env\\u00edo de grandes paquetes con solicitudes eco ICMP y detenci\\u00f3n de este env\\u00edo con una secuencia CTRL-C, tambi\\u00e9n conocido como  Bug ID CSCui60347.\"}]",
      "id": "CVE-2013-3464",
      "lastModified": "2024-11-21T01:53:40.743",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:S/C:N/I:N/A:C\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.1, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-08-13T15:04:14.017",
      "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1028914\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/86385\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1028914\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/86385\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-3464\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2013-08-13T15:04:14.017\",\"lastModified\":\"2024-11-21T01:53:40.743\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS XR permite a usuarios locales provocar una denegaci\u00f3n de servicio (corrupci\u00f3n memoria en Silicon Packet Processor, manipulaci\u00f3n indebida mutex, y recarga del dispositivo) iniciando una inundaci\u00f3n a trav\u00e9s del env\u00edo de grandes paquetes con solicitudes eco ICMP y detenci\u00f3n de este env\u00edo con una secuencia CTRL-C, tambi\u00e9n conocido como  Bug ID CSCui60347.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:N/I:N/A:C\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:2.0\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2ECF2BB-792A-4404-A215-B1DB2EC351DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.0\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BE827F-37D5-4AEA-A7A0-643BBC035F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.0\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34351F97-D5C7-446A-9AFE-43A0FC976D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35DC5F6-17E2-42A3-92D1-A6450869FDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7DC75F-39DD-43D0-B95A-60F67E7D49B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687A336-DC4E-4219-B0F2-F4112DDF2EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B61EDEF9-F29D-4486-ABD5-BF06DE577053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF9A754-3EC3-4BC9-B70E-53BFDCAA98A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADD5764-378D-4DA9-B19B-E913454CECD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2\\\\(.50\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75E061FA-2A57-4430-96E5-96C8DCF409E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD6ECE7-9AA5-4153-8787-126A1D2E2402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CD5770-F542-4B52-A6C1-2649DAF24133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC79E535-4B75-4EC8-9BF8-7BC58DDDA240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DE6FED-BA70-4EAD-8B3B-708DF124B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6E1B7D-A751-40B7-AFFB-A32E1D16F1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C703C75-167A-4CD3-98AF-13BAC15241CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B87670F-099B-4EA2-837E-F4F97D62F81A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FC1C0B-2B51-4AEE-BCD8-60E568254E46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8575FF94-D3CC-4AFE-940F-E570AEF009C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAF16A6-79A5-4A38-9D71-8C05E1DDBC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5988D97E-257C-4F44-923E-1B8F66107231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8859F6B-9D6C-4F00-B795-35097220BD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5739FA72-A93B-4404-A632-DBC722BE1C0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C1EB1B-FDFC-434D-B7E5-BCE56A489F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA237DA2-D325-455B-BE27-33A3EB5F1153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE75809C-6DF7-4E55-B74A-2806D751F879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E7DC333-3A5E-4AE0-BBCC-D656C7B1248D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37318A4A-B022-406F-9CC4-891D3D02C2FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D57DBF79-B665-422F-857E-169A6A836A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569A99B8-6DEE-44B8-8EBA-E261B981DB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B092F8-E3BD-4C6A-9AE1-F673602DED83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ACF4A41-1D8D-4FEA-B139-E6EE77AF2A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5414B4-29A3-4231-860A-B9795589A2A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8280975-E4CC-4A14-BF6E-9EB3755F046C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE1E083-4B78-43B9-A569-529B3A210F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3085D6A-D343-405F-80A9-487D7EF66AEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.8\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E77C6388-CCCE-41F4-A33A-10DA2BC72A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E5AA67-081B-4B9E-86F1-548B037E0276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5172436-13E2-48AD-B532-A104725A1DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.9\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E308B5-5C8A-4CB4-AB0B-62D8C145C017\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3051BD-FC2C-483D-B867-83349B1413E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44AEDBFC-6823-4B59-91C1-A63A2857450C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D4D1182-92F0-4A27-8014-615CE7536390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10549A6-4315-4FD5-8800-7819ECA9BDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E897239-B6AA-4DD9-A948-61B2A133ED41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0\\\\(.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E101F34E-BBBC-4D9A-A57D-71F02E75D6A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59150CDC-27BE-4578-B1D6-AAAB2874E20D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F878DD6-A5FF-41CF-A6F0-04730811B7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B3A04A-6BD8-454F-A174-F6DF74B3DDD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.1\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7292B5A8-F25B-4B9F-ACA2-1F95D2A6245D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5169C809-B809-4781-A632-F0814C7D7902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBDFB6F-9B9A-4105-94C2-12A03348B5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB55D7D-62E1-4D3B-AEDE-667A64349967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A240AD-B5C8-4048-B17D-92D162863CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2B601F-0227-443B-B204-53E06AF6BCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.2\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B97B75-8754-46C0-A9EE-4306109E9D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:4.3\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1957C15-1A36-4F91-9CDB-8317FDFEFAF1\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1028914\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/86385\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1028914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/86385\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.