ID

VAR-200212-0439


CVE

CVE-2002-1768


TITLE

Cisco IOS Rogue HSRP Service disruption due to packets (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2002-000123

DESCRIPTION

Cisco IOS 11.1 through 12.2, when HSRP support is not enabled, allows remote attackers to cause a denial of service (CPU consumption) via randomly sized UDP packets to the Hot Standby Routing Protocol (HSRP) port 1985. Cisco IOS Random size on the router that runs UDP Interfering with service operation by sending packets (DoS) There is a vulnerability that becomes a condition.Cisco IOS The router that operates is interrupted service operation (DoS) It may be in a state. IOS is the Internet Operating System, used on Cisco routers. It is distributed and maintained by Cisco. Hot Standby Routing Protocol (HSRP) is a protocol used to allow multiple routers to dynamically act as backups in the event of router failure. HSRP traffic takes place over UDP port 1985. A vulnerability has been reported with some Cisco products. If malformed HSRP traffic is received when HSRP support is not enabled, vulnerable products may reach high CPU utilization. Under these conditions, the router may fail to respond to additional network traffic, resulting in degraded performance and a denial of service condition. When the HSRP 1985 UDP communication port is opened in the CISCO router configuration, but HSRP is not configured, the attacker can submit random data to this port, which can cause the router to process these random information, resulting in increased CPU utilization and slower response, but will not causing a reboot

Trust: 1.98

sources: NVD: CVE-2002-1768 // JVNDB: JVNDB-2002-000123 // BID: 4948 // VULHUB: VHN-6151

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 0.8

vendor:ciscomodel:iosscope:neversion:12.2

Trust: 0.3

sources: BID: 4948 // JVNDB: JVNDB-2002-000123 // CNNVD: CNNVD-200212-366 // NVD: CVE-2002-1768

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-1768
value: MEDIUM

Trust: 1.0

NVD: CVE-2002-1768
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200212-366
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6151
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-1768
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-6151
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-6151 // JVNDB: JVNDB-2002-000123 // CNNVD: CNNVD-200212-366 // NVD: CVE-2002-1768

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-1768

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200212-366

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200212-366

CONFIGURATIONS

sources: JVNDB: JVNDB-2002-000123

PATCH

title:Top Pageurl:http://www.cisco.com/jp/index.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2002-000123

EXTERNAL IDS

db:BIDid:4948

Trust: 2.8

db:NVDid:CVE-2002-1768

Trust: 2.5

db:JVNDBid:JVNDB-2002-000123

Trust: 0.8

db:CNNVDid:CNNVD-200212-366

Trust: 0.7

db:BUGTRAQid:20020605 THREE POSSIBLE DOS ATTACKS AGAINST SOME IOS VERSIONS.

Trust: 0.6

db:BUGTRAQid:20020606 RE: THREE POSSIBLE DOS ATTACKS AGAINST SOME IOS VERSIONS.

Trust: 0.6

db:XFid:9282

Trust: 0.6

db:NSFOCUSid:2957

Trust: 0.6

db:VULHUBid:VHN-6151

Trust: 0.1

sources: VULHUB: VHN-6151 // BID: 4948 // JVNDB: JVNDB-2002-000123 // CNNVD: CNNVD-200212-366 // NVD: CVE-2002-1768

REFERENCES

url:http://www.securityfocus.com/bid/4948

Trust: 2.5

url:http://archives.neohapsis.com/archives/bugtraq/2002-06/0027.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2002-06/0050.html

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/9282

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1768

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1768

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/9282

Trust: 0.6

url:http://www.nsfocus.net/vulndb/2957

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html

Trust: 0.3

sources: VULHUB: VHN-6151 // BID: 4948 // JVNDB: JVNDB-2002-000123 // CNNVD: CNNVD-200212-366 // NVD: CVE-2002-1768

CREDITS

Andrew Vladimirov※ andrew@arhont.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-366

SOURCES

db:VULHUBid:VHN-6151
db:BIDid:4948
db:JVNDBid:JVNDB-2002-000123
db:CNNVDid:CNNVD-200212-366
db:NVDid:CVE-2002-1768

LAST UPDATE DATE

2024-08-14T13:51:26.029000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6151date:2017-07-11T00:00:00
db:BIDid:4948date:2002-06-05T00:00:00
db:JVNDBid:JVNDB-2002-000123date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-366date:2005-10-20T00:00:00
db:NVDid:CVE-2002-1768date:2017-07-11T01:29:24.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-6151date:2002-12-31T00:00:00
db:BIDid:4948date:2002-06-05T00:00:00
db:JVNDBid:JVNDB-2002-000123date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-366date:2002-06-05T00:00:00
db:NVDid:CVE-2002-1768date:2002-12-31T05:00:00