var-201310-0510
Vulnerability from variot
The OSPF functionality in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted options in an LSA type 11 packet, aka Bug ID CSCui21030. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Exploiting this issue may allow attackers to cause a reload of the affected device. This may cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCui21030
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0510", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "15.4(3)s" }, { "model": "ios xe", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "3.9s (.1)" }, { "model": "ios xe", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "BID", "id": "62904" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5527" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "62904" } ], "trust": 0.3 }, "cve": "CVE-2013-5527", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "exploitabilityScore": 5.5, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 5.7, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-5527", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "exploitabilityScore": 5.5, "id": "CNVD-2013-13657", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "exploitabilityScore": 5.5, "id": "VHN-65529", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5527", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-13657", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201310-151", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65529", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "VULHUB", "id": "VHN-65529" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The OSPF functionality in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted options in an LSA type 11 packet, aka Bug ID CSCui21030. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. \nExploiting this issue may allow attackers to cause a reload of the affected device. This may cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug ID CSCui21030", "sources": [ { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "BID", "id": "62904" }, { "db": "VULHUB", "id": "VHN-65529" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5527", "trust": 3.4 }, { "db": "BID", "id": "62904", "trust": 2.0 }, { "db": "OSVDB", "id": "98253", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2013-004600", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2013-13657", "trust": 0.6 }, { "db": "CISCO", "id": "20131009 CISCO IOS SOFTWARE OSPF OPAQUE LSA DENIAL OF SERVICE VULNERABILITY", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201310-151", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-65529", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "VULHUB", "id": "VHN-65529" }, { "db": "BID", "id": "62904" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "id": "VAR-201310-0510", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "VULHUB", "id": "VHN-65529" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" } ] }, "last_update_date": "2023-12-18T14:06:15.038000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco IOS Software OSPF Opaque LSA Denial of Service Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5527" }, { "title": "31201", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31201" }, { "title": "Patch for Cisco IOS and IOS XE OSPF Denial of Service Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/40136" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65529" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5527" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/62904" }, { "trust": 1.1, "url": "http://osvdb.org/98253" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87762" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5527" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5527" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "VULHUB", "id": "VHN-65529" }, { "db": "BID", "id": "62904" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-13657" }, { "db": "VULHUB", "id": "VHN-65529" }, { "db": "BID", "id": "62904" }, { "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "db": "NVD", "id": "CVE-2013-5527" }, { "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-12T00:00:00", "db": "CNVD", "id": "CNVD-2013-13657" }, { "date": "2013-10-10T00:00:00", "db": "VULHUB", "id": "VHN-65529" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62904" }, { "date": "2013-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "date": "2013-10-10T10:55:06.770000", "db": "NVD", "id": "CVE-2013-5527" }, { "date": "2013-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-12T00:00:00", "db": "CNVD", "id": "CNVD-2013-13657" }, { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-65529" }, { "date": "2013-10-10T20:34:00", "db": "BID", "id": "62904" }, { "date": "2013-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004600" }, { "date": "2017-08-29T01:33:49.497000", "db": "NVD", "id": "CVE-2013-5527" }, { "date": "2013-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-151" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS and IOS XE of OSPF Denial of service in function (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004600" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-151" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.