ID

VAR-201303-0395


CVE

CVE-2013-1148


TITLE

Cisco IOS of IP Service Level Agreement Service disruption in functionality ( Device reload ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002086

DESCRIPTION

The General Responder implementation in the IP Service Level Agreement (SLA) feature in Cisco IOS 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S allows remote attackers to cause a denial of service (device reload) via crafted (1) IPv4 or (2) IPv6 IP SLA packets on UDP port 1167, aka Bug ID CSCuc72594. Cisco IOS is prone to a remote denial-of-service vulnerability. Successful exploit of this issue could allow the attacker to cause the targeted device to reload, resulting in denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuc72594. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 1.98

sources: NVD: CVE-2013-1148 // JVNDB: JVNDB-2013-002086 // BID: 58739 // VULHUB: VHN-61150

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 2.4

vendor:ciscomodel:ios xescope:eqversion:3.2.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1.4s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.5.xs from 3.7.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.1.xs from 3.4.xs

Trust: 0.8

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

sources: BID: 58739 // JVNDB: JVNDB-2013-002086 // CNNVD: CNNVD-201303-569 // NVD: CVE-2013-1148

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1148
value: HIGH

Trust: 1.0

NVD: CVE-2013-1148
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201303-569
value: HIGH

Trust: 0.6

VULHUB: VHN-61150
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1148
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61150
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61150 // JVNDB: JVNDB-2013-002086 // CNNVD: CNNVD-201303-569 // NVD: CVE-2013-1148

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-61150 // JVNDB: JVNDB-2013-002086 // NVD: CVE-2013-1148

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201303-569

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201303-569

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002086

PATCH

title:ccisco-sa-20130327-ipslaurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ipsla

Trust: 0.8

title:Cisco IOS Software IP Service Level Agreement Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1148

Trust: 0.8

title:28650url:http://tools.cisco.com/security/center/viewAlert.x?alertId=28650

Trust: 0.8

title:cisco-sa-20130327-ipslaurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117671_cisco-sa-20130327-ipsla-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-002086

EXTERNAL IDS

db:NVDid:CVE-2013-1148

Trust: 2.8

db:BIDid:58739

Trust: 1.0

db:JVNDBid:JVNDB-2013-002086

Trust: 0.8

db:CNNVDid:CNNVD-201303-569

Trust: 0.7

db:CISCOid:20130327 CISCO IOS SOFTWARE IP SERVICE LEVEL AGREEMENT VULNERABILITY

Trust: 0.6

db:SECUNIAid:52786

Trust: 0.6

db:VULHUBid:VHN-61150

Trust: 0.1

sources: VULHUB: VHN-61150 // BID: 58739 // JVNDB: JVNDB-2013-002086 // CNNVD: CNNVD-201303-569 // NVD: CVE-2013-1148

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130327-ipsla

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1148

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1148

Trust: 0.8

url:http://secunia.com/advisories/52786

Trust: 0.6

url:http://www.securityfocus.com/bid/58739

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

sources: VULHUB: VHN-61150 // BID: 58739 // JVNDB: JVNDB-2013-002086 // CNNVD: CNNVD-201303-569 // NVD: CVE-2013-1148

CREDITS

Cisco

Trust: 0.9

sources: BID: 58739 // CNNVD: CNNVD-201303-569

SOURCES

db:VULHUBid:VHN-61150
db:BIDid:58739
db:JVNDBid:JVNDB-2013-002086
db:CNNVDid:CNNVD-201303-569
db:NVDid:CVE-2013-1148

LAST UPDATE DATE

2024-11-23T22:27:25.478000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61150date:2013-03-29T00:00:00
db:BIDid:58739date:2013-03-27T00:00:00
db:JVNDBid:JVNDB-2013-002086date:2013-04-01T00:00:00
db:CNNVDid:CNNVD-201303-569date:2013-04-02T00:00:00
db:NVDid:CVE-2013-1148date:2024-11-21T01:48:59.683

SOURCES RELEASE DATE

db:VULHUBid:VHN-61150date:2013-03-28T00:00:00
db:BIDid:58739date:2013-03-27T00:00:00
db:JVNDBid:JVNDB-2013-002086date:2013-04-01T00:00:00
db:CNNVDid:CNNVD-201303-569date:2013-03-28T00:00:00
db:NVDid:CVE-2013-1148date:2013-03-28T23:55:01.643