var-201803-1371
Vulnerability from variot
A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability. Cisco Bug IDs: CSCvf73881. Cisco IOS Software and Cisco IOS XE The software contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvf73881 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The qualityofservice (QoS) subsystem is one of the set of network quality of service subsystems. The vulnerability stems from the program failing to perform boundary detection on the values in the packet correctly. Failed attempts will likely result in denial-of-service conditions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.1" }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios xe", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios xe", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "ios everest", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "16.5.1" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "everest-16.5.1" }, { "model": "ios xe software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios everest-16.5.1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "BID", "id": "103540" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0151" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "103540" } ], "trust": 0.3 }, "cve": "CVE-2018-0151", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0151", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2018-06854", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-118353", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0151", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0151", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2018-06854", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-1038", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-118353", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-0151", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULHUB", "id": "VHN-118353" }, { "db": "VULMON", "id": "CVE-2018-0151" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability. Cisco Bug IDs: CSCvf73881. Cisco IOS Software and Cisco IOS XE The software contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvf73881 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The qualityofservice (QoS) subsystem is one of the set of network quality of service subsystems. The vulnerability stems from the program failing to perform boundary detection on the values in the packet correctly. Failed attempts will likely result in denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "BID", "id": "103540" }, { "db": "VULHUB", "id": "VHN-118353" }, { "db": "VULMON", "id": "CVE-2018-0151" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0151", "trust": 3.5 }, { "db": "BID", "id": "103540", "trust": 2.7 }, { "db": "ICS CERT", "id": "ICSA-18-107-03", "trust": 2.6 }, { "db": "SECTRACK", "id": "1040582", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2018-003423", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-1038", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-06854", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118353", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-0151", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULHUB", "id": "VHN-118353" }, { "db": "VULMON", "id": "CVE-2018-0151" }, { "db": "BID", "id": "103540" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "id": "VAR-201803-1371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULHUB", "id": "VHN-118353" } ], "trust": 1.344652135 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" } ] }, "last_update_date": "2023-12-18T12:19:01.454000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180328-qos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-qos" }, { "title": "Patch for Cisco IOS Software and IOSXESoftwarequalityofservice Subsystem Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/124465" }, { "title": "Cisco IOS Software and IOS XE Software quality of service Fixes for Subsystem Buffer Error Vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79506" }, { "title": "Cisco: Cisco IOS and IOS XE Software Quality of Service Remote Code Execution Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180328-qos" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2018/03/29/cisco_critical_ios_bugs/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-two-critical-rce-bugs-in-ios-xe-software/130852/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULMON", "id": "CVE-2018-0151" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118353" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-03" }, { "trust": 2.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-qos" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/103540" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1040582" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0151" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0151" }, { "trust": 0.6, "url": "https://securitytracker.com/id/1040582" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cisco-patches-two-critical-rce-bugs-in-ios-xe-software/130852/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULHUB", "id": "VHN-118353" }, { "db": "VULMON", "id": "CVE-2018-0151" }, { "db": "BID", "id": "103540" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-06854" }, { "db": "VULHUB", "id": "VHN-118353" }, { "db": "VULMON", "id": "CVE-2018-0151" }, { "db": "BID", "id": "103540" }, { "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "db": "NVD", "id": "CVE-2018-0151" }, { "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-01T00:00:00", "db": "CNVD", "id": "CNVD-2018-06854" }, { "date": "2018-03-28T00:00:00", "db": "VULHUB", "id": "VHN-118353" }, { "date": "2018-03-28T00:00:00", "db": "VULMON", "id": "CVE-2018-0151" }, { "date": "2018-03-28T00:00:00", "db": "BID", "id": "103540" }, { "date": "2018-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "date": "2018-03-28T22:29:00.297000", "db": "NVD", "id": "CVE-2018-0151" }, { "date": "2018-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-02T00:00:00", "db": "CNVD", "id": "CNVD-2018-06854" }, { "date": "2019-12-02T00:00:00", "db": "VULHUB", "id": "VHN-118353" }, { "date": "2019-12-02T00:00:00", "db": "VULMON", "id": "CVE-2018-0151" }, { "date": "2018-03-28T00:00:00", "db": "BID", "id": "103540" }, { "date": "2018-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003423" }, { "date": "2019-12-02T18:54:49.737000", "db": "NVD", "id": "CVE-2018-0151" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS Software and Cisco IOS XE software Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003423" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1038" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.