ID

VAR-201403-0463


CVE

CVE-2014-2113


TITLE

Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-001831

DESCRIPTION

Cisco IOS 15.1 through 15.3 and IOS XE 3.3 and 3.5 before 3.5.2E; 3.7 before 3.7.5S; and 3.8, 3.9, and 3.10 before 3.10.2S allow remote attackers to cause a denial of service (I/O memory consumption and device reload) via a malformed IPv6 packet, aka Bug ID CSCui59540. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A remote denial of service vulnerability exists in Cisco IOS/IOS XE-specific IPv6 packet processing I/O. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCui59540. The following releases are affected: Cisco IOS Releases 15.1 through 15.3; IOS XE Release 3.3, Release 3.5 prior to 3.5.2E, Release 3.7 prior to 3.7.5S, Release 3.8, Release 3.9, Release 3.10 prior to 3.10.2S

Trust: 2.52

sources: NVD: CVE-2014-2113 // JVNDB: JVNDB-2014-001831 // CNVD: CNVD-2014-01992 // BID: 66467 // VULHUB: VHN-70052

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01992

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.3.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.1\)

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.2\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.1sg

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.xs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios 15.2jascope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.3tscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xescope:ltversion:3.5

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.10

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.10.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.9

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.1 to 15.3

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.7.5s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.8

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.5.2e

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.7

Trust: 0.8

vendor:ciscomodel:ios xe 3.3xxoscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.5.1escope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.7.4sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.8.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.9.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.10.1sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1xoscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2exscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2eyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 jbscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 jb3ascope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2jbxscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2jnscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 s5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 gcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 s2scope:neversion: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios xe 3.7.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5.xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 escope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

vendor:ciscomodel:ios xe 3.7.5sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5.2escope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10.2sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 t3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e2scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2014-01992 // BID: 66467 // JVNDB: JVNDB-2014-001831 // CNNVD: CNNVD-201403-512 // NVD: CVE-2014-2113

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2113
value: HIGH

Trust: 1.0

NVD: CVE-2014-2113
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01992
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-512
value: HIGH

Trust: 0.6

VULHUB: VHN-70052
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2113
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01992
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70052
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01992 // VULHUB: VHN-70052 // JVNDB: JVNDB-2014-001831 // CNNVD: CNNVD-201403-512 // NVD: CVE-2014-2113

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70052 // JVNDB: JVNDB-2014-001831 // NVD: CVE-2014-2113

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-512

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201403-512

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001831

PATCH

title:cisco-sa-20140326-ipv6url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6

Trust: 0.8

title:33351url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33351

Trust: 0.8

title:cisco-sa-20140326-ipv6url:http://www.cisco.com/cisco/web/support/JP/112/1122/1122244_cisco-sa-20140326-ipv6-j.html

Trust: 0.8

title:Patch for I/O Remote Denial of Service Vulnerability in Cisco IOS/IOS XE-Specific IPv6 Packetsurl:https://www.cnvd.org.cn/patchInfo/show/44542

Trust: 0.6

sources: CNVD: CNVD-2014-01992 // JVNDB: JVNDB-2014-001831

EXTERNAL IDS

db:NVDid:CVE-2014-2113

Trust: 3.4

db:BIDid:66467

Trust: 2.0

db:SECUNIAid:57635

Trust: 1.2

db:JVNDBid:JVNDB-2014-001831

Trust: 0.8

db:CNNVDid:CNNVD-201403-512

Trust: 0.7

db:OSVDBid:104968

Trust: 0.6

db:CNVDid:CNVD-2014-01992

Trust: 0.6

db:CISCOid:20140326 CISCO IOS SOFTWARE CRAFTED IPV6 PACKET DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:SEEBUGid:SSVID-61985

Trust: 0.1

db:VULHUBid:VHN-70052

Trust: 0.1

sources: CNVD: CNVD-2014-01992 // VULHUB: VHN-70052 // BID: 66467 // JVNDB: JVNDB-2014-001831 // CNNVD: CNNVD-201403-512 // NVD: CVE-2014-2113

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140326-ipv6

Trust: 2.6

url:http://www.securityfocus.com/bid/66467

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2113

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2113

Trust: 0.8

url:http://osvdb.com/show/osvdb/104968

Trust: 0.6

url:http://secunia.com/advisories/57635/

Trust: 0.6

url:http://secunia.com/advisories/57635

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2014-01992 // VULHUB: VHN-70052 // BID: 66467 // JVNDB: JVNDB-2014-001831 // CNNVD: CNNVD-201403-512 // NVD: CVE-2014-2113

CREDITS

Cisco

Trust: 0.3

sources: BID: 66467

SOURCES

db:CNVDid:CNVD-2014-01992
db:VULHUBid:VHN-70052
db:BIDid:66467
db:JVNDBid:JVNDB-2014-001831
db:CNNVDid:CNNVD-201403-512
db:NVDid:CVE-2014-2113

LAST UPDATE DATE

2024-11-23T20:21:26.672000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01992date:2014-03-28T00:00:00
db:VULHUBid:VHN-70052date:2017-05-23T00:00:00
db:BIDid:66467date:2017-05-23T16:24:00
db:JVNDBid:JVNDB-2014-001831date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-512date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2113date:2024-11-21T02:05:40.570

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01992date:2014-03-28T00:00:00
db:VULHUBid:VHN-70052date:2014-03-27T00:00:00
db:BIDid:66467date:2014-03-26T00:00:00
db:JVNDBid:JVNDB-2014-001831date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-512date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2113date:2014-03-27T21:55:09.110