cve-2013-2779
Vulnerability from cvelistv5
Published
2013-04-11 10:00
Modified
2024-09-17 02:41
Severity ?
EPSS score ?
Summary
Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:44:33.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2779", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130410 Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2779", "datePublished": "2013-04-11T10:00:00Z", "dateReserved": "2013-04-11T00:00:00Z", "dateUpdated": "2024-09-17T02:41:37.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B45225F2-C9EB-493D-B845-64BFB8DBB89B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"252377A3-7F15-45F2-A169-BBC37858D4DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02E8F96A-EA9C-4E66-8491-9B2A3A4023F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85908754-8426-49D3-BCC2-AF174B5D0EF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F5BA973-D59A-4CB9-BC35-089F88737425\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E6E83FC-CFAE-45EA-9F20-830FC5E97399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7D36DA8-0CBC-424F-80FB-A59839C49FE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5872A42F-745E-4EC6-8679-C28F79F6621C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86947E54-A1B9-4ECE-92A6-417462249612\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C910BE7C-517F-4E41-8433-1858F700AA22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A862D914-CE60-48A9-9D52-299642BE3FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EB5A06F-59B5-43A1-8D06-1B6BA08630A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5F6C44-DB9D-41FD-AD8D-AF45258772DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E979597C-E614-45E9-9AC4-66DE323221BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED7C321E-F083-4AB6-96A0-D6358980441E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4376E56-A21C-4642-A85D-439C8E21CD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"444F688F-79D0-4F22-B530-7BD520080B8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EAE214D-8DD8-4DA3-872A-609E7CE6E606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7428E0A8-1641-47FB-9CA9-34311DEF660D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"854D9594-FE84-4E7B-BA21-A3287F2DC302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"399C03D1-C4B2-4DE6-9772-EC0BD88D7FCF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164.\"}, {\"lang\": \"es\", \"value\": \"Cisco IOS XE v3.4 anterior a v3.4.5S, y v3.5 hasta v3.7 anterior a v3.7.1S, ,en Routers de la serie 1000 Agregaci\\u00f3n Servicios (ASR) no aplicar correctamente el Cisco Multicast Leaf Eliminaci\\u00f3n de reciclaje (MLRE), la cual permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (recarga de tarjeta) a trav\\u00e9s fragmentado MVPN IPv6 (tambi\\u00e9n conocido como MVPNv6) paquetes, ID de error alias CSCub34945, una vulnerabilidad diferente a CVE-2013-1164.\"}]", "id": "CVE-2013-2779", "lastModified": "2024-11-21T01:52:21.097", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-04-11T10:55:02.147", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-2779\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-04-11T10:55:02.147\",\"lastModified\":\"2024-11-21T01:52:21.097\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS XE 3.4 before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 MVPN (aka MVPNv6) packets, aka Bug ID CSCub34945, a different vulnerability than CVE-2013-1164.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS XE v3.4 anterior a v3.4.5S, y v3.5 hasta v3.7 anterior a v3.7.1S, ,en Routers de la serie 1000 Agregaci\u00f3n Servicios (ASR) no aplicar correctamente el Cisco Multicast Leaf Eliminaci\u00f3n de reciclaje (MLRE), la cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de tarjeta) a trav\u00e9s fragmentado MVPN IPv6 (tambi\u00e9n conocido como MVPNv6) paquetes, ID de error alias CSCub34945, una vulnerabilidad diferente a CVE-2013-1164.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B45225F2-C9EB-493D-B845-64BFB8DBB89B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252377A3-7F15-45F2-A169-BBC37858D4DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E8F96A-EA9C-4E66-8491-9B2A3A4023F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85908754-8426-49D3-BCC2-AF174B5D0EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5BA973-D59A-4CB9-BC35-089F88737425\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E6E83FC-CFAE-45EA-9F20-830FC5E97399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7D36DA8-0CBC-424F-80FB-A59839C49FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5872A42F-745E-4EC6-8679-C28F79F6621C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86947E54-A1B9-4ECE-92A6-417462249612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C910BE7C-517F-4E41-8433-1858F700AA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A862D914-CE60-48A9-9D52-299642BE3FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB5A06F-59B5-43A1-8D06-1B6BA08630A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5F6C44-DB9D-41FD-AD8D-AF45258772DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E979597C-E614-45E9-9AC4-66DE323221BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7C321E-F083-4AB6-96A0-D6358980441E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4376E56-A21C-4642-A85D-439C8E21CD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"444F688F-79D0-4F22-B530-7BD520080B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAE214D-8DD8-4DA3-872A-609E7CE6E606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7428E0A8-1641-47FB-9CA9-34311DEF660D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"854D9594-FE84-4E7B-BA21-A3287F2DC302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"399C03D1-C4B2-4DE6-9772-EC0BD88D7FCF\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.