ID

VAR-201309-0036


CVE

CVE-2013-1121


TITLE

Cisco NX-OS of BGP Implementation of regex Service disruption in engines (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004264

DESCRIPTION

The regex engine in the BGP implementation in Cisco NX-OS, when a complex regular expression is configured for inbound routes, allows remote attackers to cause a denial of service (device reload) via a crafted AS path set, aka Bug ID CSCuf49554. ( Device reload ) There are vulnerabilities that are put into a state. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. A BGP code implementation in Cisco NX-OS Software has a security vulnerability that allows unauthenticated remote attackers to overload affected devices. The vulnerability can be triggered if the affected device has a complex regular expression applied to the inbound route, and the vulnerability can be successfully triggered to trigger a Cisco NX-OS Software reboot. Cisco NX-OS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco bug ID CSCuf49554. Cisco NX-OS is a data center-oriented operating system developed by Cisco. The vulnerability stems from an error in the regular expression engine's handling of complex regular expressions

Trust: 2.52

sources: NVD: CVE-2013-1121 // JVNDB: JVNDB-2013-004264 // CNVD: CNVD-2013-13158 // BID: 62446 // VULHUB: VHN-61123

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-13158

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:nx-osscope:lteversion:6.1(3)

Trust: 0.8

vendor:ciscomodel:nx-os softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:nx-os 5.1 n1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:nx-os 5.0 n2scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:nx-os 5.0 n1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(4)

Trust: 0.3

sources: CNVD: CNVD-2013-13158 // BID: 62446 // JVNDB: JVNDB-2013-004264 // CNNVD: CNNVD-201309-346 // NVD: CVE-2013-1121

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1121
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1121
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-13158
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201309-346
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61123
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1121
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13158
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-61123
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-13158 // VULHUB: VHN-61123 // JVNDB: JVNDB-2013-004264 // CNNVD: CNNVD-201309-346 // NVD: CVE-2013-1121

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-61123 // JVNDB: JVNDB-2013-004264 // NVD: CVE-2013-1121

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201309-346

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201309-346

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004264

PATCH

title:Cisco NX-OS Software BGP Regex Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1121

Trust: 0.8

title:30837url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30837

Trust: 0.8

title:Patch for Cisco NX-OS software BGP Regular Expression Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/39658

Trust: 0.6

sources: CNVD: CNVD-2013-13158 // JVNDB: JVNDB-2013-004264

EXTERNAL IDS

db:NVDid:CVE-2013-1121

Trust: 3.4

db:BIDid:62446

Trust: 1.0

db:JVNDBid:JVNDB-2013-004264

Trust: 0.8

db:CNNVDid:CNNVD-201309-346

Trust: 0.7

db:CNVDid:CNVD-2013-13158

Trust: 0.6

db:CISCOid:20130917 CISCO NX-OS SOFTWARE BGP REGEX VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-61123

Trust: 0.1

sources: CNVD: CNVD-2013-13158 // VULHUB: VHN-61123 // BID: 62446 // JVNDB: JVNDB-2013-004264 // CNNVD: CNNVD-201309-346 // NVD: CVE-2013-1121

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-1121

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1121

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1121

Trust: 0.8

url:http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscuf49554

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2013-13158 // VULHUB: VHN-61123 // BID: 62446 // JVNDB: JVNDB-2013-004264 // CNNVD: CNNVD-201309-346 // NVD: CVE-2013-1121

CREDITS

Cisco

Trust: 0.3

sources: BID: 62446

SOURCES

db:CNVDid:CNVD-2013-13158
db:VULHUBid:VHN-61123
db:BIDid:62446
db:JVNDBid:JVNDB-2013-004264
db:CNNVDid:CNNVD-201309-346
db:NVDid:CVE-2013-1121

LAST UPDATE DATE

2024-08-14T15:19:16.714000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13158date:2013-09-22T00:00:00
db:VULHUBid:VHN-61123date:2013-09-20T00:00:00
db:BIDid:62446date:2013-09-21T00:11:00
db:JVNDBid:JVNDB-2013-004264date:2013-09-25T00:00:00
db:CNNVDid:CNNVD-201309-346date:2013-09-23T00:00:00
db:NVDid:CVE-2013-1121date:2013-09-20T00:53:24.117

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-13158date:2013-09-22T00:00:00
db:VULHUBid:VHN-61123date:2013-09-19T00:00:00
db:BIDid:62446date:2013-09-17T00:00:00
db:JVNDBid:JVNDB-2013-004264date:2013-09-25T00:00:00
db:CNNVDid:CNNVD-201309-346date:2013-09-23T00:00:00
db:NVDid:CVE-2013-1121date:2013-09-19T18:55:05.540