ID

VAR-201307-0198


CVE

CVE-2013-3411


TITLE

IDSM-2 Use Cisco Catalyst 6500 Runs on the device Cisco IPS of IDSM-2 Service disruption in drivers (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-003448

DESCRIPTION

The IDSM-2 drivers in Cisco Intrusion Prevention System (IPS) Software on Cisco Catalyst 6500 devices with an IDSM-2 module allow remote attackers to cause a denial of service (device hang) via malformed IPv4 TCP packets, aka Bug ID CSCuh27460. Cisco IPS Software is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the system kernel to become unresponsive, which leads to denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuh27460. Cisco Intrusion Prevention System (IPS) is an intrusion prevention system of Cisco (Cisco). The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors

Trust: 1.98

sources: NVD: CVE-2013-3411 // JVNDB: JVNDB-2013-003448 // BID: 61299 // VULHUB: VHN-63413

AFFECTED PRODUCTS

vendor:ciscomodel:intrusion prevention systemscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:idsm-2scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 6500 series intrusion detection system modulescope:eqversion:(idsm-2)

Trust: 0.8

vendor:ciscomodel:intrusion prevention system softwarescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2013-003448 // CNNVD: CNNVD-201307-401 // NVD: CVE-2013-3411

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3411
value: HIGH

Trust: 1.0

NVD: CVE-2013-3411
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201307-401
value: HIGH

Trust: 0.6

VULHUB: VHN-63413
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-3411
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-63413
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63413 // JVNDB: JVNDB-2013-003448 // CNNVD: CNNVD-201307-401 // NVD: CVE-2013-3411

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-3411

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201307-401

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201307-401

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003448

PATCH

title:29271url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=29271

Trust: 0.8

title:cisco-sa-20130717-ipsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips

Trust: 0.8

title:30026url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30026

Trust: 0.8

title:cisco-sa-20130717-ipsurl:http://www.cisco.com/cisco/web/support/JP/111/1118/1118530_cisco-sa-20130717-ips-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-003448

EXTERNAL IDS

db:NVDid:CVE-2013-3411

Trust: 2.8

db:SECUNIAid:54242

Trust: 1.1

db:JVNDBid:JVNDB-2013-003448

Trust: 0.8

db:CNNVDid:CNNVD-201307-401

Trust: 0.7

db:CISCOid:20130717 MULTIPLE VULNERABILITIES IN CISCO INTRUSION PREVENTION SYSTEM SOFTWARE

Trust: 0.6

db:BIDid:61299

Trust: 0.4

db:VULHUBid:VHN-63413

Trust: 0.1

sources: VULHUB: VHN-63413 // BID: 61299 // JVNDB: JVNDB-2013-003448 // CNNVD: CNNVD-201307-401 // NVD: CVE-2013-3411

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130717-ips

Trust: 2.0

url:http://secunia.com/advisories/54242

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3411

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3411

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-63413 // BID: 61299 // JVNDB: JVNDB-2013-003448 // CNNVD: CNNVD-201307-401 // NVD: CVE-2013-3411

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 61299

SOURCES

db:VULHUBid:VHN-63413
db:BIDid:61299
db:JVNDBid:JVNDB-2013-003448
db:CNNVDid:CNNVD-201307-401
db:NVDid:CVE-2013-3411

LAST UPDATE DATE

2024-08-14T14:34:19.176000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63413date:2013-08-20T00:00:00
db:BIDid:61299date:2013-07-17T00:00:00
db:JVNDBid:JVNDB-2013-003448date:2013-07-22T00:00:00
db:CNNVDid:CNNVD-201307-401date:2013-07-29T00:00:00
db:NVDid:CVE-2013-3411date:2013-08-20T03:23:32.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-63413date:2013-07-18T00:00:00
db:BIDid:61299date:2013-07-17T00:00:00
db:JVNDBid:JVNDB-2013-003448date:2013-07-22T00:00:00
db:CNNVDid:CNNVD-201307-401date:2013-07-22T00:00:00
db:NVDid:CVE-2013-3411date:2013-07-18T12:48:56.960