ID

VAR-201304-0270


CVE

CVE-2013-1165


TITLE

Cisco ASR 1000 Series Cisco IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002220

DESCRIPTION

Cisco IOS XE 2.x and 3.x before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) allows remote attackers to cause a denial of service (card reload) by sending many crafted L2TP packets, aka Bug ID CSCtz23293. Vendors have confirmed this vulnerability Bug ID CSCtz23293 It is released as.Skillfully crafted by a third party L2TP Service disruption via packets ( Reload card ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The Cisco 1000 ASR does not correctly handle special L2TP packets, allowing an attacker to send a large number of L2TP packets to overload the system and cause a denial of service attack. The communication with the target affected device cannot trigger this vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. Repeated attacks will result in a sustained denial of service. This issue is being tracked by Cisco Bug ID CSCtz23293

Trust: 2.52

sources: NVD: CVE-2013-1165 // JVNDB: JVNDB-2013-002220 // CNVD: CNVD-2013-03005 // BID: 59007 // VULHUB: VHN-61167

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-03005

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:2.2.3

Trust: 1.9

vendor:ciscomodel:ios xescope:eqversion:2.3.1

Trust: 1.9

vendor:ciscomodel:ios xescope:eqversion:2.3.2

Trust: 1.9

vendor:ciscomodel:ios xescope:eqversion:2.1.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.4.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.4.4

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.6.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.x

Trust: 1.4

vendor:ciscomodel:ios xescope:eqversion:2.6.1

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5.2

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5.1

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.6.2

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.4.1

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.1.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.2.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.4s

Trust: 1.0

vendor:ciscomodel:asr 1023 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1004scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002 fixed routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.3.1t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.2.2

Trust: 1.0

vendor:ciscomodel:asr 1002-xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.0s

Trust: 1.0

vendor:ciscomodel:asr 1001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.1s

Trust: 1.0

vendor:ciscomodel:asr 1002scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.3

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.2

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.1

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.5

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.6

Trust: 0.9

vendor:ciscomodel:ios xescope:eqversion:3.7

Trust: 0.9

vendor:ciscomodel:ios xescope:ltversion:3.x

Trust: 0.8

vendor:ciscomodel:asr 1002-x routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 fixed routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 0.8

vendor:ciscomodel:asr 1004 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.7

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.5 from 3.7.1s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ios xe 3.4.5sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:ios xe tscope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.4

Trust: 0.3

vendor:ciscomodel:ios xe 3.7.1sscope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2013-03005 // BID: 59007 // JVNDB: JVNDB-2013-002220 // CNNVD: CNNVD-201304-184 // NVD: CVE-2013-1165

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1165
value: HIGH

Trust: 1.0

NVD: CVE-2013-1165
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-03005
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201304-184
value: HIGH

Trust: 0.6

VULHUB: VHN-61167
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1165
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-03005
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-61167
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-03005 // VULHUB: VHN-61167 // JVNDB: JVNDB-2013-002220 // CNNVD: CNNVD-201304-184 // NVD: CVE-2013-1165

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-61167 // JVNDB: JVNDB-2013-002220 // NVD: CVE-2013-1165

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-184

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201304-184

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002220

PATCH

title:cisco-sa-20130410-asr1000url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000

Trust: 0.8

title:28815url:http://tools.cisco.com/security/center/viewAlert.x?alertId=28815

Trust: 0.8

title:cisco-sa-20130410-asr1000url:http://www.cisco.com/cisco/web/support/JP/111/1117/1117745_cisco-sa-20130410-asr1000-j.html

Trust: 0.8

title:Patch for Cisco IOS XE L2TP Communication Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/33253

Trust: 0.6

title:Cisco 1000 ASR Cisco IOS XE Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164601

Trust: 0.6

sources: CNVD: CNVD-2013-03005 // JVNDB: JVNDB-2013-002220 // CNNVD: CNNVD-201304-184

EXTERNAL IDS

db:NVDid:CVE-2013-1165

Trust: 3.4

db:BIDid:59007

Trust: 1.0

db:JVNDBid:JVNDB-2013-002220

Trust: 0.8

db:CNNVDid:CNNVD-201304-184

Trust: 0.7

db:CNVDid:CNVD-2013-03005

Trust: 0.6

db:VULHUBid:VHN-61167

Trust: 0.1

sources: CNVD: CNVD-2013-03005 // VULHUB: VHN-61167 // BID: 59007 // JVNDB: JVNDB-2013-002220 // CNNVD: CNNVD-201304-184 // NVD: CVE-2013-1165

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130410-asr1000

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1165

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1165

Trust: 0.8

sources: CNVD: CNVD-2013-03005 // VULHUB: VHN-61167 // JVNDB: JVNDB-2013-002220 // CNNVD: CNNVD-201304-184 // NVD: CVE-2013-1165

CREDITS

Cisco

Trust: 0.3

sources: BID: 59007

SOURCES

db:CNVDid:CNVD-2013-03005
db:VULHUBid:VHN-61167
db:BIDid:59007
db:JVNDBid:JVNDB-2013-002220
db:CNNVDid:CNNVD-201304-184
db:NVDid:CVE-2013-1165

LAST UPDATE DATE

2024-11-23T22:59:47.405000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-03005date:2013-04-15T00:00:00
db:VULHUBid:VHN-61167date:2013-04-11T00:00:00
db:BIDid:59007date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002220date:2013-04-15T00:00:00
db:CNNVDid:CNNVD-201304-184date:2021-10-08T00:00:00
db:NVDid:CVE-2013-1165date:2024-11-21T01:49:01.807

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-03005date:2013-04-15T00:00:00
db:VULHUBid:VHN-61167date:2013-04-11T00:00:00
db:BIDid:59007date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002220date:2013-04-15T00:00:00
db:CNNVDid:CNNVD-201304-184date:2013-04-12T00:00:00
db:NVDid:CVE-2013-1165date:2013-04-11T10:55:01.890