var-201411-0255
Vulnerability from variot
Race condition in the lighttpd module in Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (process reload) by establishing many TCP sessions, aka Bug ID CSCuq45239. Cisco IOS XR is a fully modular, distributed network operating system from Cisco's IOS software family. This issue is being tracked by Cisco Bug ID CSCuq45239. Lighttpd is one of the web server modules
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0255", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "5.1.0" }, { "model": "ios xr", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "5.1" }, { "model": "ios xr software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios xr", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.1.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-8005" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "71287" } ], "trust": 0.3 }, "cve": "CVE-2014-8005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-8005", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2014-08544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-75950", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-8005", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-08544", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201411-499", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-75950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "VULHUB", "id": "VHN-75950" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition in the lighttpd module in Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (process reload) by establishing many TCP sessions, aka Bug ID CSCuq45239. Cisco IOS XR is a fully modular, distributed network operating system from Cisco\u0027s IOS software family. \nThis issue is being tracked by Cisco Bug ID CSCuq45239. Lighttpd is one of the web server modules", "sources": [ { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "BID", "id": "71287" }, { "db": "VULHUB", "id": "VHN-75950" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-8005", "trust": 3.4 }, { "db": "BID", "id": "71287", "trust": 2.0 }, { "db": "SECTRACK", "id": "1031262", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-005642", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-499", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-08544", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-75950", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "VULHUB", "id": "VHN-75950" }, { "db": "BID", "id": "71287" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "id": "VAR-201411-0255", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "VULHUB", "id": "VHN-75950" } ], "trust": 1.25286753 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" } ] }, "last_update_date": "2023-12-18T12:21:11.058000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco IOS XR Software lighttpd TCP Session Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-8005" }, { "title": "36532", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36532" }, { "title": "Patch for Cisco IOS XR Software TCP Session Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/52212" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-75950" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-8005" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/71287" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36532" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031262" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98937" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8005" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8005" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps5845/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "VULHUB", "id": "VHN-75950" }, { "db": "BID", "id": "71287" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-08544" }, { "db": "VULHUB", "id": "VHN-75950" }, { "db": "BID", "id": "71287" }, { "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "db": "NVD", "id": "CVE-2014-8005" }, { "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-27T00:00:00", "db": "CNVD", "id": "CNVD-2014-08544" }, { "date": "2014-11-26T00:00:00", "db": "VULHUB", "id": "VHN-75950" }, { "date": "2014-11-25T00:00:00", "db": "BID", "id": "71287" }, { "date": "2014-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "date": "2014-11-26T02:59:04.450000", "db": "NVD", "id": "CVE-2014-8005" }, { "date": "2014-11-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-27T00:00:00", "db": "CNVD", "id": "CNVD-2014-08544" }, { "date": "2017-09-08T00:00:00", "db": "VULHUB", "id": "VHN-75950" }, { "date": "2014-11-25T00:00:00", "db": "BID", "id": "71287" }, { "date": "2014-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005642" }, { "date": "2017-09-08T01:29:19.480000", "db": "NVD", "id": "CVE-2014-8005" }, { "date": "2014-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-499" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-499" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Network Convergence System 6000 Runs on the device Cisco IOS XR of lighttpd Service disruption in modules (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005642" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competitive condition", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-499" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.