var-201507-0231
Vulnerability from variot
The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733. Vendors have confirmed this vulnerability Bug ID CSCts66733 It is released as.Service disruption by a third party ( Device hang or reload ) There is a possibility of being put into a state. A remote attacker could exploit the vulnerability to cause a denial of service (device hangs or reloads). This issue is being tracked by Cisco Bug ID CSCts66733. The following products and versions are affected: Cisco IOS 12.2(44)SQ1 release, 12.2(33)XN1 release, 12.4(25e)JAM1 release, 12.4(25e)JAO5m release, 12.4(23)JY release, 15.0(2)ED1 release , 15.0(2) EY3 version, 15.1(3) SVF4a version, 15.2(2) JB1 version; IOS XE 2.5.x version, 2.6.x version, 3.1.xS version, 3.2.xS version, 3.3.xS version, 3.4 .xS version, 3.5.xS version before 3.6.0S, 3.1.xSG version, 3.2.xSG version, 3.3.xSG version before 3.4.0SG, 3.2.xSE version before 3.3.0SE, 3.2.xXO version before 3.3.0XO, 3.2.xSQ version, 3.3.xSQ version, 3.4.xSQ version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0231", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.2\\(33\\)xn1", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "15.0\\(2\\)ed1", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.2\\(44\\)sq1", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "15.0\\(2\\)ey3", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "15.2\\(2\\)jb1", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.4\\(25e\\)jao5m", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "15.1\\(3\\)svf4a", }, { model: "ios xe", scope: "eq", trust: 1.6, vendor: "cisco", version: "3.3sq.0", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.4\\(23\\)jy", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.4\\(25e\\)jam1", }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.6.2", }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.6.1", }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.5.2", }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.5.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.8", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2xo.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3sq.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2s.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.9", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3sg.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.4", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.7", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4sq.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2se.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2se.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.5", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5s_base", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2s.3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.4", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2se.3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.4", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.5", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5s.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.6.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2xo.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2se.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.5", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1sg.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3sg.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2s.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4s.3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2s.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.5.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5s.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1sg.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5s.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3sg.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1s.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2sg.3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4sq.0", }, { model: "ios 12.2 sq1", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.2 xn1", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.2.xxo", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.4.0sg", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.2.xse", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "15.2(2)jb1", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.2(44)sq1", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.1.xs", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "15.0(2)ed1", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.4.xs", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.2(33)xn1", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.2.xsq", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.3.0xo", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.3.xs", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "2.6.x", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.5.xs", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.2.xsg", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "15.0(2)ey3", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.1.xsg", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.3.0se", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "15.1(3)svf4a", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.4.xsq", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.4(23)jy", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.6.0s", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.4(25e)jam1", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "3.3.xsq", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.2.xs", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "3.3.xsg", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.4(25e)jao5m", }, { model: "ios xe", scope: "lt", trust: 0.8, vendor: "cisco", version: "2.5.x", }, { model: "ios xe", scope: "eq", trust: 0.6, vendor: "cisco", version: "2.5.x", }, { model: "ios xe", scope: "eq", trust: 0.6, vendor: "cisco", version: "2.6.x", }, { model: "ios 12.4 jam1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.4 jao5m", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.4 jy", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.0 ed1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.0 ey3", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.1 svf4a", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.2 jb1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.5.xs", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.1.xsg", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.2.xsg", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.3.xsg", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.2.xse", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.2.xxo", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.2.xsq", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.3.xsq", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe 3.4.xsq", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.1 t", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.6", }, { model: "ios 15.1 t2a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.1 t2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0m", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 xa5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 xa1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 sy1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4jy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4gc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 gc1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sy2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "BID", id: "75995", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3sq.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(23\\)jy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2s.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1sg.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5s.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5s.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2se.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2se.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3sg.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jao5m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5s_base:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2xo.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3sg.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3sq.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4sq.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4sq.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(33\\)xn1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svf4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5s.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2xo.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2se.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1s.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2s.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2s.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4s.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2se.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2sg.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3sg.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2s.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1sg.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2015-0681", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco and Zhangzhibing of team vhunter", sources: [ { db: "BID", id: "75995", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], trust: 0.9, }, cve: "CVE-2015-0681", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", exploitabilityScore: 8.6, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.1, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2015-0681", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "CNVD-2015-04986", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "VHN-78627", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2015-0681", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2015-04986", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201507-738", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-78627", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "VULHUB", id: "VHN-78627", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733. Vendors have confirmed this vulnerability Bug ID CSCts66733 It is released as.Service disruption by a third party ( Device hang or reload ) There is a possibility of being put into a state. A remote attacker could exploit the vulnerability to cause a denial of service (device hangs or reloads). \nThis issue is being tracked by Cisco Bug ID CSCts66733. The following products and versions are affected: Cisco IOS 12.2(44)SQ1 release, 12.2(33)XN1 release, 12.4(25e)JAM1 release, 12.4(25e)JAO5m release, 12.4(23)JY release, 15.0(2)ED1 release , 15.0(2) EY3 version, 15.1(3) SVF4a version, 15.2(2) JB1 version; IOS XE 2.5.x version, 2.6.x version, 3.1.xS version, 3.2.xS version, 3.3.xS version, 3.4 .xS version, 3.5.xS version before 3.6.0S, 3.1.xSG version, 3.2.xSG version, 3.3.xSG version before 3.4.0SG, 3.2.xSE version before 3.3.0SE, 3.2.xXO version before 3.3.0XO, 3.2.xSQ version, 3.3.xSQ version, 3.4.xSQ version", sources: [ { db: "NVD", id: "CVE-2015-0681", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "CNVD", id: "CNVD-2015-04986", }, { db: "BID", id: "75995", }, { db: "VULHUB", id: "VHN-78627", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2015-0681", trust: 3.4, }, { db: "BID", id: "75995", trust: 1.6, }, { db: "SECTRACK", id: "1033023", trust: 1.1, }, { db: "JVNDB", id: "JVNDB-2015-003928", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201507-738", trust: 0.7, }, { db: "CNVD", id: "CNVD-2015-04986", trust: 0.6, }, { db: "VULHUB", id: "VHN-78627", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "VULHUB", id: "VHN-78627", }, { db: "BID", id: "75995", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], }, id: "VAR-201507-0231", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "VULHUB", id: "VHN-78627", }, ], trust: 0.06999999999999999, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, ], }, last_update_date: "2023-12-18T13:39:17.649000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20150722-tftp", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp", }, { title: "cisco-sa-20150722-tftp_cvrf", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml", }, { title: "39988", trust: 0.8, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=39988", }, { title: "cisco-sa-20150722-tftp", trust: 0.8, url: "http://www.cisco.com/cisco/web/support/jp/113/1130/1130210_cisco-sa-20150722-tftp-j.html", }, { title: "Patch for Cisco IOS and IOS XE Software Denial of Service Vulnerability (CNVD-2015-04986)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/61680", }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-399", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-78627", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp", }, { trust: 1.7, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033023", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0681", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0681", }, { trust: 0.6, url: "http://www.securityfocus.com/bid/75995", }, { trust: 0.3, url: "http://www.cisco.com/", }, { trust: 0.3, url: "http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html", }, { trust: 0.3, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=39988", }, ], sources: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "VULHUB", id: "VHN-78627", }, { db: "BID", id: "75995", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2015-04986", }, { db: "VULHUB", id: "VHN-78627", }, { db: "BID", id: "75995", }, { db: "JVNDB", id: "JVNDB-2015-003928", }, { db: "NVD", id: "CVE-2015-0681", }, { db: "CNNVD", id: "CNNVD-201507-738", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-07-28T00:00:00", db: "CNVD", id: "CNVD-2015-04986", }, { date: "2015-07-24T00:00:00", db: "VULHUB", id: "VHN-78627", }, { date: "2015-07-22T00:00:00", db: "BID", id: "75995", }, { date: "2015-07-28T00:00:00", db: "JVNDB", id: "JVNDB-2015-003928", }, { date: "2015-07-24T16:59:00.067000", db: "NVD", id: "CVE-2015-0681", }, { date: "2015-07-23T00:00:00", db: "CNNVD", id: "CNNVD-201507-738", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-08-03T00:00:00", db: "CNVD", id: "CNVD-2015-04986", }, { date: "2017-09-21T00:00:00", db: "VULHUB", id: "VHN-78627", }, { date: "2015-07-22T00:00:00", db: "BID", id: "75995", }, { date: "2015-07-28T00:00:00", db: "JVNDB", id: "JVNDB-2015-003928", }, { date: "2017-09-21T01:29:01.070000", db: "NVD", id: "CVE-2015-0681", }, { date: "2015-07-27T00:00:00", db: "CNNVD", id: "CNNVD-201507-738", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201507-738", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco IOS and IOS XE of TFTP Service disruption at the server (DoS) Vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2015-003928", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201507-738", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.