ID

VAR-201310-0535


CVE

CVE-2013-5549


TITLE

Cisco IOS XR Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004894

DESCRIPTION

Cisco IOS XR 3.8.1 through 4.2.0 does not properly process fragmented packets within the RP-A, RP-B, PRP, and DRP-B route-processor components, which allows remote attackers to cause a denial of service (transmission outage) via (1) IPv4 or (2) IPv6 traffic, aka Bug ID CSCuh30380. Vendors have confirmed this vulnerability Bug ID CSCuh30380 It is released as.By a third party (1) IPv4 Or (2) IPv6 Service disruption through traffic ( Stop sending ) There is a possibility of being put into a state. Cisco IOS XR is a member of the Cisco IOS Software family that uses a microkernel-based operating system architecture. Lead to a denial of service attack. The following processors are affected by this vulnerability: Cisco CRS 16-Slot Line Card Chassis Route Processor (RP-A) Cisco CRS 16-Slot Line Card Chassis Route Processor B (RP-B) Carrier Routing System (CRS) Performance Route Processor (PRP) ) Cisco CRS Distributed Route Processor (DRP-B). Successfully exploiting this issue may allow an attacker to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuh30380. The vulnerability stems from the fact that the router processor components (including: RP-A, RP-B, PRP, DRP-B) do not properly process segmented data Bag. A remote attacker could exploit this vulnerability to cause a denial of service (transmission interruption) by sending fragmented packets to an affected system

Trust: 2.52

sources: NVD: CVE-2013-5549 // JVNDB: JVNDB-2013-004894 // CNVD: CNVD-2013-14149 // BID: 63298 // VULHUB: VHN-65551

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-14149

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:eqversion:4.0.1

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.8.3

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.8.1

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:4.0.0

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.9.1

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.8.4

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.8.2

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:3.9.2

Trust: 1.9

vendor:ciscomodel:ios xrscope:eqversion:4.0.2

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:3.9.0

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:4.1.1

Trust: 1.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.3

Trust: 1.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.2

Trust: 1.3

vendor:ciscomodel:ios xrscope:eqversion:4.0.4

Trust: 1.3

vendor:ciscomodel:ios xrscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:4.2.0

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:3.8.1 to 4.2.0

Trust: 0.8

vendor:ciscomodel:ios xr softwarescope:eqversion:3.3.0-4.2.0

Trust: 0.6

vendor:ciscomodel:ios xrscope:eqversion:3.7.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.9

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.1.0

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.4.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.3.4

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.7

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.5.3

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:3.8

Trust: 0.3

sources: CNVD: CNVD-2013-14149 // BID: 63298 // JVNDB: JVNDB-2013-004894 // CNNVD: CNNVD-201310-569 // NVD: CVE-2013-5549

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5549
value: HIGH

Trust: 1.0

NVD: CVE-2013-5549
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-14149
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201310-569
value: HIGH

Trust: 0.6

VULHUB: VHN-65551
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5549
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-14149
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65551
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-14149 // VULHUB: VHN-65551 // JVNDB: JVNDB-2013-004894 // CNNVD: CNNVD-201310-569 // NVD: CVE-2013-5549

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-5549

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-569

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201310-569

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004894

PATCH

title:cisco-sa-20131023-iosxrurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-iosxr

Trust: 0.8

title:31369url:http://tools.cisco.com/security/center/viewAlert.x?alertId=31369

Trust: 0.8

title:cisco-sa-20131023-iosxrurl:http://www.cisco.com/cisco/web/support/JP/112/1120/1120774_cisco-sa-20131023-iosxr-j.html

Trust: 0.8

title:Cisco IOS XR Software Fragmented Message Handling Patch for Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/40574

Trust: 0.6

sources: CNVD: CNVD-2013-14149 // JVNDB: JVNDB-2013-004894

EXTERNAL IDS

db:NVDid:CVE-2013-5549

Trust: 3.4

db:BIDid:63298

Trust: 1.6

db:JVNDBid:JVNDB-2013-004894

Trust: 0.8

db:CNVDid:CNVD-2013-14149

Trust: 0.6

db:CISCOid:20131023 CISCO IOS XR SOFTWARE ROUTE PROCESSOR DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-201310-569

Trust: 0.6

db:VULHUBid:VHN-65551

Trust: 0.1

sources: CNVD: CNVD-2013-14149 // VULHUB: VHN-65551 // BID: 63298 // JVNDB: JVNDB-2013-004894 // CNNVD: CNNVD-201310-569 // NVD: CVE-2013-5549

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131023-iosxr

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5549

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5549

Trust: 0.8

url:http://www.securityfocus.com/bid/63298

Trust: 0.6

url:http://www.cisco.com/en/us/products/ps5845/index.html

Trust: 0.3

sources: CNVD: CNVD-2013-14149 // VULHUB: VHN-65551 // BID: 63298 // JVNDB: JVNDB-2013-004894 // CNNVD: CNNVD-201310-569 // NVD: CVE-2013-5549

CREDITS

Cisco

Trust: 0.9

sources: BID: 63298 // CNNVD: CNNVD-201310-569

SOURCES

db:CNVDid:CNVD-2013-14149
db:VULHUBid:VHN-65551
db:BIDid:63298
db:JVNDBid:JVNDB-2013-004894
db:CNNVDid:CNNVD-201310-569
db:NVDid:CVE-2013-5549

LAST UPDATE DATE

2024-11-23T22:27:22.913000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14149date:2013-10-30T00:00:00
db:VULHUBid:VHN-65551date:2013-10-25T00:00:00
db:BIDid:63298date:2013-10-23T00:00:00
db:JVNDBid:JVNDB-2013-004894date:2013-10-28T00:00:00
db:CNNVDid:CNNVD-201310-569date:2013-10-28T00:00:00
db:NVDid:CVE-2013-5549date:2024-11-21T01:57:41.060

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-14149date:2013-10-30T00:00:00
db:VULHUBid:VHN-65551date:2013-10-25T00:00:00
db:BIDid:63298date:2013-10-23T00:00:00
db:JVNDBid:JVNDB-2013-004894date:2013-10-28T00:00:00
db:CNNVDid:CNNVD-201310-569date:2013-10-24T00:00:00
db:NVDid:CVE-2013-5549date:2013-10-25T03:52:55.033