ID

VAR-201303-0247


CVE

CVE-2013-0711


TITLE

VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-000018

DESCRIPTION

IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to cause a denial of service (daemon outage) via a crafted authentication request. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability. The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability due to an issue in processing authentication requests. Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.SSH access may become unavailable until the next reboot as a result of processing an authentication request. VxWorks is an embedded real-time operating system. VxWorks is prone to a denial-of-service vulnerability. VxWorks 6.5 through 6.9 are vulnerable; other versions may also be affected. Vendor affected: TP-Link (http://tp-link.com) Products affected: * All TP-Link VxWorks-based devices (confirmed by vendor) * All "2-series" switches (confirmed by vendor) * TL-SG2008 semi-managed switch (confirmed by vendor) * TL-SG2216 semi-managed switch (confirmed by vendor) * TL-SG2424 semi-managed switch (confirmed by vendor) * TL-SG2424P semi-managed switch (confirmed by vendor) * TL-SG2452 semi-managed switch (confirmed by vendor) Vulnerabilities: * All previously-reported VxWorks vulnerabilities from 6.6.0 on; at the very least: * CVE-2013-0716 (confirmed by vendor) * CVE-2013-0715 (confirmed by vendor) * CVE-2013-0714 (confirmed by vendor) * CVE-2013-0713 (confirmed by vendor) * CVE-2013-0712 (confirmed by vendor) * CVE-2013-0711 (confirmed by vendor) * CVE-2010-2967 (confirmed by vendor) * CVE-2010-2966 (confirmed by vendor) * CVE-2008-2476 (confirmed by vendor) * SSLv2 is available and cannot be disabled unless HTTPS is completely disabled (allows downgrade attacks) (confirmed by vendor) * SSL (v2, v3) offers insecure cipher suites and HMACs which cannot be disabled (allows downgrade attacks) (confirmed by vendor) Design flaws: * Telnet is available and cannot be disabled (confirmed by vendor) * SSHv1 enabled by default if SSH is enabled (confirmed by vendor) Vendor response: TP-Link are not convinced that these flaws should be repaired. TP-Link's Internet presence -- or at least DNS -- is available only intermittently. Most emails bounced. Lost contact with vendor, but did confirm that development lead is now on holiday and will not return for at least a week. Initial vendor reaction was to recommend purchase of "3-series" switches. Vendor did not offer reasons why "3-series" switches would be more secure, apart from lack of telnet service. Vendor confirmed that no development time can be allocated to securing "2-series" product and all focus has shifted to newer products. (TL-SG2008 first product availability July 2014...) Vendor deeply confused about security of DES/3DES, MD5, claimed that all security is relative. ("...[E]ven SHA-1 can be cracked, they just have different security level.") Fix availability: None. Work-arounds advised: None possible. Remove products from network

Trust: 3.42

sources: NVD: CVE-2013-0711 // JVNDB: JVNDB-2013-000018 // CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // BID: 58638 // IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 128512

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

category:['IoT', 'ICS']sub_category: -

Trust: 0.6

sources: IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191

AFFECTED PRODUCTS

vendor:windrivermodel:vxworksscope:eqversion:6.9

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:6.7

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:6.8

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:6.6

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:6.5

Trust: 1.6

vendor:windmodel:river systems vxworks throughscope:eqversion:6.56.9

Trust: 1.2

vendor:wind rivermodel:vxworksscope:eqversion:6.5 through 6.9

Trust: 0.8

vendor:vxworksmodel: - scope:eqversion:6.5

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6.6

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6.7

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6.8

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6.9

Trust: 0.4

sources: IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // JVNDB: JVNDB-2013-000018 // CNNVD: CNNVD-201303-405 // NVD: CVE-2013-0711

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0711
value: HIGH

Trust: 1.0

IPA: JVNDB-2013-000018
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-01996
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-02191
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201303-405
value: HIGH

Trust: 0.6

IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 0961e59c-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2013-0711
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2013-000018
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2013-01996
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-02191
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 0961e59c-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // JVNDB: JVNDB-2013-000018 // CNNVD: CNNVD-201303-405 // NVD: CVE-2013-0711

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2013-0711

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201303-405

TYPE

Input validation

Trust: 1.0

sources: IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201303-405

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-000018

PATCH

title:Information from Wind River Systemsurl:http://jvn.jp/en/jp/JVN45545972/995359/index.html

Trust: 0.8

title:Patch for VxWorks SSH server (IPSSH) Denial of Service Vulnerability (CNVD-2013-01996)url:https://www.cnvd.org.cn/patchInfo/show/32969

Trust: 0.6

title:Patch for VxWorks WebCLI Remote Denial of Service Vulnerability (CNVD-2013-02191)url:https://www.cnvd.org.cn/patchInfo/show/33010

Trust: 0.6

sources: CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // JVNDB: JVNDB-2013-000018

EXTERNAL IDS

db:NVDid:CVE-2013-0711

Trust: 4.4

db:JVNDBid:JVNDB-2013-000018

Trust: 3.0

db:JVNid:JVN45545972

Trust: 3.0

db:ICS CERTid:ICSA-13-091-01

Trust: 1.8

db:CNNVDid:CNNVD-201303-405

Trust: 1.0

db:CNVDid:CNVD-2013-01996

Trust: 0.8

db:CNVDid:CNVD-2013-02191

Trust: 0.8

db:SECUNIAid:52671

Trust: 0.6

db:JVNid:JVN#45545972

Trust: 0.6

db:BIDid:58638

Trust: 0.3

db:IVDid:C403BD44-1F2F-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:0961E59C-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:128512

Trust: 0.1

sources: IVD: c403bd44-1f2f-11e6-abef-000c29c66e3d // IVD: 0961e59c-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // BID: 58638 // JVNDB: JVNDB-2013-000018 // PACKETSTORM: 128512 // CNNVD: CNNVD-201303-405 // NVD: CVE-2013-0711

REFERENCES

url:http://jvn.jp/en/jp/jvn45545972/index.html

Trust: 2.4

url:http://ics-cert.us-cert.gov/advisories/icsa-13-091-01

Trust: 1.8

url:http://jvndb.jvn.jp/jvndb/jvndb-2013-000018

Trust: 1.6

url:http://jvn.jp/en/jp/jvn45545972/995359/index.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0711

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0711

Trust: 0.8

url:http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000018.html

Trust: 0.6

url:http://jvn.jp/en/jp/jvn45545972/

Trust: 0.6

url:http://secunia.com/advisories/52671/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-2966

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0713

Trust: 0.1

url:http://tp-link.com)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0715

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2476

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0716

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0711

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0714

Trust: 0.1

sources: CNVD: CNVD-2013-01996 // CNVD: CNVD-2013-02191 // JVNDB: JVNDB-2013-000018 // PACKETSTORM: 128512 // CNNVD: CNNVD-201303-405 // NVD: CVE-2013-0711

CREDITS

Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd

Trust: 0.3

sources: BID: 58638

SOURCES

db:IVDid:c403bd44-1f2f-11e6-abef-000c29c66e3d
db:IVDid:0961e59c-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-01996
db:CNVDid:CNVD-2013-02191
db:BIDid:58638
db:JVNDBid:JVNDB-2013-000018
db:PACKETSTORMid:128512
db:CNNVDid:CNNVD-201303-405
db:NVDid:CVE-2013-0711

LAST UPDATE DATE

2024-11-23T20:09:41.542000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-01996date:2013-03-25T00:00:00
db:CNVDid:CNVD-2013-02191date:2013-05-21T00:00:00
db:BIDid:58638date:2013-04-02T06:47:00
db:JVNDBid:JVNDB-2013-000018date:2013-06-25T00:00:00
db:CNNVDid:CNNVD-201303-405date:2013-03-21T00:00:00
db:NVDid:CVE-2013-0711date:2024-11-21T01:48:02.833

SOURCES RELEASE DATE

db:IVDid:c403bd44-1f2f-11e6-abef-000c29c66e3ddate:2013-03-25T00:00:00
db:IVDid:0961e59c-2353-11e6-abef-000c29c66e3ddate:2013-03-27T00:00:00
db:CNVDid:CNVD-2013-01996date:2013-03-25T00:00:00
db:CNVDid:CNVD-2013-02191date:2013-03-27T00:00:00
db:BIDid:58638date:2013-03-18T00:00:00
db:JVNDBid:JVNDB-2013-000018date:2013-03-18T00:00:00
db:PACKETSTORMid:128512date:2014-10-01T10:11:11
db:CNNVDid:CNNVD-201303-405date:2013-03-21T00:00:00
db:NVDid:CVE-2013-0711date:2013-03-20T18:55:01.700