ID

VAR-201308-0212


CVE

CVE-2013-3464


TITLE

Cisco IOS XR Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-003718

DESCRIPTION

Cisco IOS XR allows local users to cause a denial of service (Silicon Packet Processor memory corruption, improper mutex handling, and device reload) by starting an outbound flood of large ICMP Echo Request packets and stopping this with a CTRL-C sequence, aka Bug ID CSCui60347. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS XR Software. An attacker could exploit the vulnerability to cause a denial of service by sending a large number of ICMP echo request packets and a stop sequence. A local attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco bug ID CSCui60347

Trust: 2.52

sources: NVD: CVE-2013-3464 // JVNDB: JVNDB-2013-003718 // CNVD: CNVD-2013-12421 // BID: 61761 // VULHUB: VHN-63466

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-12421

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.4\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:2.0\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.2\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.1\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.3\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.0\(.1\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.0\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.50\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.2\(.6\)

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.5\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.3\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.3\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.4\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.9\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.9\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.7\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.1\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.1\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.7\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.7\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.4\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.5\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.6_base

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.9\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.1\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.5\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.3\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.4\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.5\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.6\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.6\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.7_base

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.3\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.4\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.6\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.3\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0_base

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.0\(.11\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.3\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.5\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.1_base

Trust: 1.0

vendor:ciscomodel:ios xrscope:lteversion:4.3

Trust: 0.8

vendor:ciscomodel:ios xrscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xrscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.11

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.50

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.6

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9.2

Trust: 0.3

sources: CNVD: CNVD-2013-12421 // BID: 61761 // JVNDB: JVNDB-2013-003718 // CNNVD: CNNVD-201308-192 // NVD: CVE-2013-3464

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3464
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-3464
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-12421
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201308-192
value: MEDIUM

Trust: 0.6

VULHUB: VHN-63466
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-3464
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-12421
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-63466
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-12421 // VULHUB: VHN-63466 // JVNDB: JVNDB-2013-003718 // CNNVD: CNNVD-201308-192 // NVD: CVE-2013-3464

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-63466 // JVNDB: JVNDB-2013-003718 // NVD: CVE-2013-3464

THREAT TYPE

local

Trust: 0.9

sources: BID: 61761 // CNNVD: CNNVD-201308-192

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201308-192

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003718

PATCH

title:Cisco IOS XR Internet Control Message Protocol Denial of Service Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464

Trust: 0.8

title:30396url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30396

Trust: 0.8

title:Patch for Cisco IOS XR Software Local Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/38215

Trust: 0.6

sources: CNVD: CNVD-2013-12421 // JVNDB: JVNDB-2013-003718

EXTERNAL IDS

db:NVDid:CVE-2013-3464

Trust: 3.4

db:SECTRACKid:1028914

Trust: 1.1

db:BIDid:61761

Trust: 1.0

db:JVNDBid:JVNDB-2013-003718

Trust: 0.8

db:CNNVDid:CNNVD-201308-192

Trust: 0.7

db:CNVDid:CNVD-2013-12421

Trust: 0.6

db:CISCOid:20130812 CISCO IOS XR INTERNET CONTROL MESSAGE PROTOCOL DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-63466

Trust: 0.1

sources: CNVD: CNVD-2013-12421 // VULHUB: VHN-63466 // BID: 61761 // JVNDB: JVNDB-2013-003718 // CNNVD: CNNVD-201308-192 // NVD: CVE-2013-3464

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-3464

Trust: 2.6

url:http://www.securitytracker.com/id/1028914

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/86385

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3464

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3464

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=30396

Trust: 0.3

sources: CNVD: CNVD-2013-12421 // VULHUB: VHN-63466 // BID: 61761 // JVNDB: JVNDB-2013-003718 // CNNVD: CNNVD-201308-192 // NVD: CVE-2013-3464

CREDITS

Cisco

Trust: 0.3

sources: BID: 61761

SOURCES

db:CNVDid:CNVD-2013-12421
db:VULHUBid:VHN-63466
db:BIDid:61761
db:JVNDBid:JVNDB-2013-003718
db:CNNVDid:CNNVD-201308-192
db:NVDid:CVE-2013-3464

LAST UPDATE DATE

2024-08-14T15:44:54.404000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-12421date:2013-08-26T00:00:00
db:VULHUBid:VHN-63466date:2017-08-29T00:00:00
db:BIDid:61761date:2013-08-12T00:00:00
db:JVNDBid:JVNDB-2013-003718date:2013-08-14T00:00:00
db:CNNVDid:CNNVD-201308-192date:2013-08-22T00:00:00
db:NVDid:CVE-2013-3464date:2017-08-29T01:33:23.730

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-12421date:2013-08-16T00:00:00
db:VULHUBid:VHN-63466date:2013-08-13T00:00:00
db:BIDid:61761date:2013-08-12T00:00:00
db:JVNDBid:JVNDB-2013-003718date:2013-08-14T00:00:00
db:CNNVDid:CNNVD-201308-192date:2013-08-22T00:00:00
db:NVDid:CVE-2013-3464date:2013-08-13T15:04:14.017