ID

VAR-200803-0034


CVE

CVE-2008-0537


TITLE

plural Cisco Service disruption in certain product functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001244

DESCRIPTION

Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors. An attacker can exploit this issue to prevent any traffic from entering affected devices, causing denial-of-service conditions for legitimate users. The following devices are affected: Cisco Catalyst 6500 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL Cisco 7600 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL Cisco 7600 Series devices with the RSP720, RSP720-3C, or RSP720-3CXL Cisco ME 6524 Ethernet Switch Some Cisco IOS branches based on 12.2 are vulnerable only when combined with hardware based on specific Catalyst Supervisor Engines (Sup32, Sup720, or RSP720) and configured with MPLS VPN and OSPF sham-link. NOTE: OSPF and MPLS VPN are not enabled by default. Cisco IOS is the Internet operating system used in Cisco networking equipment. In addition to possibly blocked interface queues, devices may also experience memory leaks or reboots. In the case of a memory leak, the device cannot forward traffic once it has exhausted the available memory. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. The vulnerability is caused due to an unspecified error in the handling of certain packets and can be exploited to cause a blocked interface input queue, a memory leak, or a restart of the device. PROVIDED AND/OR DISCOVERED BY: Reported to the vendor by a customer. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-087B Cisco Updates for Multiple Vulnerabilities Original release date: March 27, 2007 Last revised: -- Source: US-CERT Systems Affected * Cisco IOS Overview Cisco has released Cisco Security Advisory cisco-sa-20080326-bundle to correct multiple vulnerabilities affecting Cisco IOS. Attackers could exploit these vulnerabilities to access sensitive information or cause a denial of service. I. Description Cisco Security Advisory cisco-sa-20080326-bundle addresses a number of vulnerabilities affecting Cisco IOS 12.0, 12.1, 12.2, 12.3, and 12.4. Further details are available in the US-CERT Vulnerability Notes Database. II. Impact The impacts of these vulnerabilities vary. Potential consequences include disclosure of sensitive information and denial of service. III. Solution Upgrade These vulnerabilities are addressed in Cisco Security Advisory cisco-sa-20080326-bundle. IV. References * US-CERT Vulnerability Notes - <http://www.kb.cert.org/vuls/byid?searchview&query=cisco-sa-20080326-bundle> * Cisco Security Advisory cisco-sa-20080326-bundle - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-bundle.shtml> * Cisco Security Advisory: Cisco IOS Virtual Private Dial-up Network Denial of Service Vulnerability - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-pptp.shtml> * Cisco Security Advisory: Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-dlsw.shtml> * Cisco Security Advisory: Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml> * Cisco Security Advisory: Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720 - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml> * Cisco Security Advisory: Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak - <http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-087B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-087B Feedback VU#936177" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History March 27, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR+vjW/RFkHkM87XOAQLjnQf+PgUTq9wrF8th28Ur2qUgViOGFbNOzwbp 1Awp1ygPnGsT2BVBdwo7ugfuQXMHiz8rnG/7Ovf5prr3FjI6I/3XRMFTpS/ZmF1W m0e6H+vhJSmvJp02a4X9Rzm8Rq9jYda7SJHAFiiblxMSKOuOn2bKpOPxyrhnZmcA UsuFp5A4mHoMqi4LWO0XqCTBzC1r3myx9j3dVg0yJ0LuIvYWUoqOsHI1ywG+ryLO MfSbpvFgbfU5pn3e61hS++oIpOjmlLuRdu1o/2vHizqcUSfhKx2ccdOUG0c2Opr/ oabL6WpJHRePXbz1jdOPHGVPVH/6OVVSr+L2Ug1Qd8hBLwwbcfGweQ== =pX05 -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2008-0537 // JVNDB: JVNDB-2008-001244 // BID: 28463 // VULHUB: VHN-30662 // PACKETSTORM: 64963 // PACKETSTORM: 64957

AFFECTED PRODUCTS

vendor:ciscomodel:me 6524 ethernet switchscope: - version: -

Trust: 1.4

vendor:ciscomodel:supervisor enginescope:eqversion:sup720

Trust: 1.0

vendor:ciscomodel:route switch processorscope:eqversion:rsp720

Trust: 1.0

vendor:ciscomodel:supervisor enginescope:eqversion:sup32

Trust: 1.0

vendor:ciscomodel:7500 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:catalyst 6500 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:catalyst 6500scope: - version: -

Trust: 0.6

vendor:ciscomodel:7600 routerscope: - version: -

Trust: 0.6

vendor:ciscomodel:me6524scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.2zuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixascope: - version: -

Trust: 0.3

vendor:ciscomodel:catalyst sup720-3bxlscope:eqversion:6500

Trust: 0.3

vendor:ciscomodel:catalyst sup720-3bscope:eqversion:6500

Trust: 0.3

vendor:ciscomodel:catalyst sup720scope:eqversion:6500

Trust: 0.3

vendor:ciscomodel:catalyst sup32scope:eqversion:6500

Trust: 0.3

vendor:ciscomodel:sup720-3bxlscope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:sup720-3bscope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:sup720scope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:sup32scope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:rsp720-3cxlscope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:rsp720-3cscope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:rsp720scope:eqversion:7600

Trust: 0.3

vendor:ciscomodel:ios 12.2sxhscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxfscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixfscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxh2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sra7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sra4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxf13scope:neversion: -

Trust: 0.3

sources: BID: 28463 // JVNDB: JVNDB-2008-001244 // CNNVD: CNNVD-200803-436 // NVD: CVE-2008-0537

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0537
value: HIGH

Trust: 1.0

NVD: CVE-2008-0537
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-436
value: HIGH

Trust: 0.6

VULHUB: VHN-30662
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-0537
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30662
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30662 // JVNDB: JVNDB-2008-001244 // CNNVD: CNNVD-200803-436 // NVD: CVE-2008-0537

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2008-001244 // NVD: CVE-2008-0537

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200803-436

TYPE

design error

Trust: 0.6

sources: CNNVD: CNNVD-200803-436

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001244

PATCH

title:cisco-sa-20080326-queueurl:http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-001244

EXTERNAL IDS

db:BIDid:28463

Trust: 2.8

db:NVDid:CVE-2008-0537

Trust: 2.8

db:SECUNIAid:29559

Trust: 2.6

db:USCERTid:TA08-087B

Trust: 2.6

db:VUPENid:ADV-2008-1005

Trust: 1.7

db:SECTRACKid:1019716

Trust: 1.7

db:JVNDBid:JVNDB-2008-001244

Trust: 0.8

db:CNNVDid:CNNVD-200803-436

Trust: 0.7

db:CERT/CCid:TA08-087B

Trust: 0.6

db:CISCOid:20080326 VULNERABILITY IN CISCO IOS WITH OSPF, MPLS VPN, AND SUPERVISOR 32, SUPERVISOR 720, OR ROUTE SWITCH PROCESSOR 720

Trust: 0.6

db:XFid:41466

Trust: 0.6

db:VULHUBid:VHN-30662

Trust: 0.1

db:PACKETSTORMid:64963

Trust: 0.1

db:PACKETSTORMid:64957

Trust: 0.1

sources: VULHUB: VHN-30662 // BID: 28463 // JVNDB: JVNDB-2008-001244 // PACKETSTORM: 64963 // PACKETSTORM: 64957 // CNNVD: CNNVD-200803-436 // NVD: CVE-2008-0537

REFERENCES

url:http://www.securityfocus.com/bid/28463

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-087b.html

Trust: 2.5

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml

Trust: 1.8

url:http://www.securitytracker.com/id?1019716

Trust: 1.7

url:http://secunia.com/advisories/29559

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1005/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41466

Trust: 1.1

url:http://secunia.com/advisories/29559/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0537

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1005

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-087b/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-087b

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0537

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41466

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1005/references

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/490111

Trust: 0.3

url:http://secunia.com/product/15865/

Trust: 0.1

url:http://secunia.com/product/50/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/15864/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/182/

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=cisco-sa-20080326-bundle>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-dlsw.shtml>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-bundle.shtml>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-ipv4ipv6.shtml>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-087b.html>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-pptp.shtml>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml>

Trust: 0.1

sources: VULHUB: VHN-30662 // BID: 28463 // JVNDB: JVNDB-2008-001244 // PACKETSTORM: 64963 // PACKETSTORM: 64957 // CNNVD: CNNVD-200803-436 // NVD: CVE-2008-0537

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200803-436

SOURCES

db:VULHUBid:VHN-30662
db:BIDid:28463
db:JVNDBid:JVNDB-2008-001244
db:PACKETSTORMid:64963
db:PACKETSTORMid:64957
db:CNNVDid:CNNVD-200803-436
db:NVDid:CVE-2008-0537

LAST UPDATE DATE

2024-11-23T19:59:16.646000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30662date:2017-08-08T00:00:00
db:BIDid:28463date:2008-03-26T21:09:00
db:JVNDBid:JVNDB-2008-001244date:2008-04-18T00:00:00
db:CNNVDid:CNNVD-200803-436date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0537date:2024-11-21T00:42:20

SOURCES RELEASE DATE

db:VULHUBid:VHN-30662date:2008-03-27T00:00:00
db:BIDid:28463date:2008-03-26T00:00:00
db:JVNDBid:JVNDB-2008-001244date:2008-04-18T00:00:00
db:PACKETSTORMid:64963date:2008-03-28T20:26:02
db:PACKETSTORMid:64957date:2008-03-27T21:29:26
db:CNNVDid:CNNVD-200803-436date:2008-03-27T00:00:00
db:NVDid:CVE-2008-0537date:2008-03-27T10:44:00