var-200210-0188
Vulnerability from variot
Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. When the CBOS TCP/IP stack is forced to process a high number of unusually large packets, it will consume all memory. This will cause the router to freeze and stop forwarding packets. CBOS (Cisco Broadband Operating System) is the operating system for Cisco 600 series routers. It is possible for a remote user to cause a denial of service of a CPE running CBOS software 2.4.4 and prior. Sending an unusually large packet to the telnet port will exploit this issue. The following devices in the Cisco 600 series of routers are affected by this issue: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678. This vulnerability has been assigned Cisco Bug ID CSCdv50135. CBOS does not correctly process the information packets submitted to the DHCP server, which can lead to denial of service attacks by remote attackers. The vulnerability number is: CSCdw90020
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200210-0188", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.4.4" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.4.3" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.4.2" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.4.1" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.3.9" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.3.8" }, { "model": "cbos", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "2.3.7.002" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.3.7" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.3.5.015" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.3.5" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.3.2" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.3" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.2.1" }, { "model": "cbos", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "2.0.1" }, { "model": "cbos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.4.2ap" }, { "model": "cbos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.3_.053" }, { "model": "cbos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.4.2b" }, { "model": "cbos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.1.0" }, { "model": "cbos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.2.0" }, { "model": "cbos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.1.0a" }, { "model": "cbos", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.2.1a" }, { "model": "cbos b", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.4.2" }, { "model": "cbos ap", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.4.2" }, { "model": "cbos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.3.053" }, { "model": "cbos a", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.2.1" }, { "model": "cbos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.2" }, { "model": "cbos a", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.1" }, { "model": "cbos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "2.1" }, { "model": "cbos", "scope": "ne", "trust": 0.9, "vendor": "cisco", "version": "2.4.5" } ], "sources": [ { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" }, { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.7.002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.1.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.5.015:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2ap:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3_.053:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0886" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery of this issue is credited to Knud Erik H\u00f8jgaard from Cybercity,\nDenmark.", "sources": [ { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" } ], "trust": 0.6 }, "cve": "CVE-2002-0886", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-5277", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2002-0886", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200210-028", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-5277", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-5277" }, { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. \nWhen the CBOS TCP/IP stack is forced to process a high number of unusually large packets, it will consume all memory. This will cause the router to freeze and stop forwarding packets. CBOS (Cisco Broadband Operating System) is the operating system for Cisco\n600 series routers. \nIt is possible for a remote user to cause a denial of service of a CPE running CBOS software 2.4.4 and prior. \nSending an unusually large packet to the telnet port will exploit this issue. \nThe following devices in the Cisco 600 series of routers are affected by this issue:\n605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678. \nThis vulnerability has been assigned Cisco Bug ID CSCdv50135. CBOS does not correctly process the information packets submitted to the DHCP server, which can lead to denial of service attacks by remote attackers. The vulnerability number is: CSCdw90020", "sources": [ { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" }, { "db": "VULHUB", "id": "VHN-5277" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-5277", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5277" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "4813", "trust": 2.0 }, { "db": "BID", "id": "4814", "trust": 2.0 }, { "db": "BID", "id": "4815", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2002-0886", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200210-028", "trust": 0.7 }, { "db": "XF", "id": "9151", "trust": 0.6 }, { "db": "XF", "id": "9152", "trust": 0.6 }, { "db": "XF", "id": "9153", "trust": 0.6 }, { "db": "CISCO", "id": "20020523 CBOS - IMPROVING RESILIENCE TO DENIAL-OF-SERVICE ATTACKS", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-75298", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "21472", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-5277", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-5277" }, { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" }, { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "id": "VAR-200210-0188", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5277" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:54:24.894000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0886" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/4813" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/4814" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/4815" }, { "trust": 1.7, "url": "http://www.cisco.com/warp/public/707/cbos-dos.shtml" }, { "trust": 1.7, "url": "http://www.iss.net/security_center/static/9151.php" }, { "trust": 1.7, "url": "http://www.iss.net/security_center/static/9153.php" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9152" }, { "trust": 0.9, "url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/9152" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5277" }, { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" }, { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-5277" }, { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" }, { "db": "NVD", "id": "CVE-2002-0886" }, { "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-10-04T00:00:00", "db": "VULHUB", "id": "VHN-5277" }, { "date": "2002-05-23T00:00:00", "db": "BID", "id": "4815" }, { "date": "2002-05-23T00:00:00", "db": "BID", "id": "4814" }, { "date": "2002-05-23T00:00:00", "db": "BID", "id": "4813" }, { "date": "2002-10-04T04:00:00", "db": "NVD", "id": "CVE-2002-0886" }, { "date": "2002-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-5277" }, { "date": "2002-05-23T00:00:00", "db": "BID", "id": "4815" }, { "date": "2002-05-23T00:00:00", "db": "BID", "id": "4814" }, { "date": "2009-07-11T12:46:00", "db": "BID", "id": "4813" }, { "date": "2017-07-11T01:29:12.900000", "db": "NVD", "id": "CVE-2002-0886" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200210-028" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco CBOS Oversized packet leads DHCP Denial of service attack vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200210-028" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "4815" }, { "db": "BID", "id": "4814" }, { "db": "BID", "id": "4813" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.