ID

VAR-201310-0530


CVE

CVE-2013-5547


TITLE

Cisco ASR 1000 Runs on series devices Cisco IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004967

DESCRIPTION

Cisco IOS XE 3.9 before 3.9.2S on 1000 ASR devices allows remote attackers to cause a denial of service (device reload) by sending malformed EoGRE packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCuf08269. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The attacker failed to properly handle malformed EoGRE packets. The attacker exploited this vulnerability by sending malformed IPv4 or IPv6 EoGRE packets to affected devices configured with the EoGRE interface. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuf08269

Trust: 2.52

sources: NVD: CVE-2013-5547 // JVNDB: JVNDB-2013-004967 // CNVD: CNVD-2013-14210 // BID: 63439 // VULHUB: VHN-65549

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-14210

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.9.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.9.0s

Trust: 1.6

vendor:ciscomodel:asr 1004scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1023 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002-xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002-x routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1023 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.9.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.9

Trust: 0.8

vendor:ciscomodel:asr 1002 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1004 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2013-14210 // JVNDB: JVNDB-2013-004967 // CNNVD: CNNVD-201310-724 // NVD: CVE-2013-5547

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5547
value: HIGH

Trust: 1.0

NVD: CVE-2013-5547
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-14210
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201310-724
value: HIGH

Trust: 0.6

VULHUB: VHN-65549
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5547
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-14210
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65549
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-14210 // VULHUB: VHN-65549 // JVNDB: JVNDB-2013-004967 // CNNVD: CNNVD-201310-724 // NVD: CVE-2013-5547

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-65549 // JVNDB: JVNDB-2013-004967 // NVD: CVE-2013-5547

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-724

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201310-724

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004967

PATCH

title:cisco-sa-20131030-asr1000url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000

Trust: 0.8

title:31456url:http://tools.cisco.com/security/center/viewAlert.x?alertId=31456

Trust: 0.8

title:cisco-sa-20131030-asr1000url:http://www.cisco.com/cisco/web/support/JP/112/1120/1120847_cisco-sa-20131030-asr1000-j.html

Trust: 0.8

title:Patch for Cisco IOS XE TCP Segment Reassembly Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/40652

Trust: 0.6

title:Cisco IOS XE EoGRE Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164608

Trust: 0.6

sources: CNVD: CNVD-2013-14210 // JVNDB: JVNDB-2013-004967 // CNNVD: CNNVD-201310-724

EXTERNAL IDS

db:NVDid:CVE-2013-5547

Trust: 3.4

db:BIDid:63439

Trust: 1.0

db:JVNDBid:JVNDB-2013-004967

Trust: 0.8

db:CNNVDid:CNNVD-201310-724

Trust: 0.7

db:CNVDid:CNVD-2013-14210

Trust: 0.6

db:VULHUBid:VHN-65549

Trust: 0.1

sources: CNVD: CNVD-2013-14210 // VULHUB: VHN-65549 // BID: 63439 // JVNDB: JVNDB-2013-004967 // CNNVD: CNNVD-201310-724 // NVD: CVE-2013-5547

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131030-asr1000

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5547

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5547

Trust: 0.8

sources: CNVD: CNVD-2013-14210 // VULHUB: VHN-65549 // JVNDB: JVNDB-2013-004967 // CNNVD: CNNVD-201310-724 // NVD: CVE-2013-5547

CREDITS

Cisco

Trust: 0.3

sources: BID: 63439

SOURCES

db:CNVDid:CNVD-2013-14210
db:VULHUBid:VHN-65549
db:BIDid:63439
db:JVNDBid:JVNDB-2013-004967
db:CNNVDid:CNNVD-201310-724
db:NVDid:CVE-2013-5547

LAST UPDATE DATE

2024-11-23T22:39:04.535000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14210date:2013-11-04T00:00:00
db:VULHUBid:VHN-65549date:2013-11-01T00:00:00
db:BIDid:63439date:2013-10-30T00:00:00
db:JVNDBid:JVNDB-2013-004967date:2013-11-05T00:00:00
db:CNNVDid:CNNVD-201310-724date:2021-10-08T00:00:00
db:NVDid:CVE-2013-5547date:2024-11-21T01:57:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-14210date:2013-11-04T00:00:00
db:VULHUBid:VHN-65549date:2013-10-31T00:00:00
db:BIDid:63439date:2013-10-30T00:00:00
db:JVNDBid:JVNDB-2013-004967date:2013-11-05T00:00:00
db:CNNVDid:CNNVD-201310-724date:2013-10-31T00:00:00
db:NVDid:CVE-2013-5547date:2013-10-31T21:55:02.893