ID

VAR-201304-0171


CVE

CVE-2013-1216


TITLE

Cisco IOS XR of SNMP Service disruption in modules (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002503

DESCRIPTION

Memory leak in the SNMP module in Cisco IOS XR allows remote authenticated users to cause a denial of service (memory consumption and process restart) via crafted SNMP packets, aka Bug ID CSCue31546. Cisco IOS is a popular Internet operating system. Cisco IOS XR is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue may allow an attacker to cause a denial of service condition. This issue is being tracked by Cisco Bug ID CSCue31546. Versions prior to Cisco IOS XR 4.3 are vulnerable

Trust: 2.52

sources: NVD: CVE-2013-1216 // JVNDB: JVNDB-2013-002503 // CNVD: CNVD-2013-04604 // BID: 59550 // VULHUB: VHN-61218

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-04604

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope: - version: -

Trust: 1.4

vendor:ciscomodel:ios xrscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.x

Trust: 0.6

vendor:ciscomodel:ios xrscope:eqversion:3.7.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.1.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.50

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.6

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.4

Trust: 0.3

sources: CNVD: CNVD-2013-04604 // BID: 59550 // JVNDB: JVNDB-2013-002503 // CNNVD: CNNVD-201304-605 // NVD: CVE-2013-1216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1216
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1216
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-04604
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201304-605
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61218
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1216
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-04604
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-61218
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-04604 // VULHUB: VHN-61218 // JVNDB: JVNDB-2013-002503 // CNNVD: CNNVD-201304-605 // NVD: CVE-2013-1216

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-61218 // JVNDB: JVNDB-2013-002503 // NVD: CVE-2013-1216

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-605

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201304-605

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002503

PATCH

title:Cisco IOS XR Software SNMP Memory Leak Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1216

Trust: 0.8

title:29103url:http://tools.cisco.com/security/center/viewAlert.x?alertId=29103

Trust: 0.8

title:Patch for Cisco IOS XR SNMP Module Memory Leak Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/33750

Trust: 0.6

sources: CNVD: CNVD-2013-04604 // JVNDB: JVNDB-2013-002503

EXTERNAL IDS

db:NVDid:CVE-2013-1216

Trust: 3.4

db:BIDid:59550

Trust: 1.0

db:JVNDBid:JVNDB-2013-002503

Trust: 0.8

db:CNNVDid:CNNVD-201304-605

Trust: 0.7

db:CNVDid:CNVD-2013-04604

Trust: 0.6

db:SECUNIAid:53278

Trust: 0.6

db:CISCOid:20130425 CISCO IOS XR SOFTWARE SNMP MEMORY LEAK VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-61218

Trust: 0.1

sources: CNVD: CNVD-2013-04604 // VULHUB: VHN-61218 // BID: 59550 // JVNDB: JVNDB-2013-002503 // CNNVD: CNNVD-201304-605 // NVD: CVE-2013-1216

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-1216

Trust: 2.0

url:http://tools.cisco.com/security/center/viewalert.x?alertid=29103

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1216

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1216

Trust: 0.8

url:http://secunia.com/advisories/53278

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2013-04604 // VULHUB: VHN-61218 // BID: 59550 // JVNDB: JVNDB-2013-002503 // CNNVD: CNNVD-201304-605 // NVD: CVE-2013-1216

CREDITS

Cisco

Trust: 0.3

sources: BID: 59550

SOURCES

db:CNVDid:CNVD-2013-04604
db:VULHUBid:VHN-61218
db:BIDid:59550
db:JVNDBid:JVNDB-2013-002503
db:CNNVDid:CNNVD-201304-605
db:NVDid:CVE-2013-1216

LAST UPDATE DATE

2024-11-23T23:02:52.387000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-04604date:2013-05-03T00:00:00
db:VULHUBid:VHN-61218date:2013-05-01T00:00:00
db:BIDid:59550date:2013-04-25T00:00:00
db:JVNDBid:JVNDB-2013-002503date:2013-05-10T00:00:00
db:CNNVDid:CNNVD-201304-605date:2013-05-02T00:00:00
db:NVDid:CVE-2013-1216date:2024-11-21T01:49:07.830

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-04604date:2013-05-03T00:00:00
db:VULHUBid:VHN-61218date:2013-04-29T00:00:00
db:BIDid:59550date:2013-04-25T00:00:00
db:JVNDBid:JVNDB-2013-002503date:2013-04-30T00:00:00
db:CNNVDid:CNNVD-201304-605date:2013-04-29T00:00:00
db:NVDid:CVE-2013-1216date:2013-04-29T12:20:36.227