ID

VAR-201404-0030


CVE

CVE-2012-5017


TITLE

Cisco IOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-006199

DESCRIPTION

Cisco IOS before 15.1(1)SY1 allows remote authenticated users to cause a denial of service (device reload) by establishing a VPN session and then sending malformed IKEv2 packets, aka Bug ID CSCub39268. Cisco IOS There is a service disruption ( Device reload ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. IOS is prone to a denial-of-service vulnerability

Trust: 2.52

sources: NVD: CVE-2012-5017 // JVNDB: JVNDB-2012-006199 // CNVD: CNVD-2014-02675 // BID: 78099 // VULHUB: VHN-58298

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02675

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 2.5

vendor:ciscomodel:asr 1002 fixed routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1023 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:15.1\(1\)sy

Trust: 1.0

vendor:ciscomodel:asr 1002-xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1004scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 fixed routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002-x routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1004 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1023 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:ltversion:15.1(1)sy1

Trust: 0.8

vendor:ciscomodel:asr routerscope:eqversion:1001

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1002-x

Trust: 0.6

vendor:ciscomodel:asr fixed routerscope:eqversion:1002

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1002

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1004

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1006

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1023

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy

Trust: 0.6

vendor:ciscomodel:iosmigrate 15.1 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1023-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1006-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1004-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002-x-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002-

Trust: 0.3

vendor:ciscomodel:asr fixed routerscope:eqversion:1002-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1001-

Trust: 0.3

sources: CNVD: CNVD-2014-02675 // BID: 78099 // JVNDB: JVNDB-2012-006199 // CNNVD: CNNVD-201404-457 // NVD: CVE-2012-5017

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5017
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5017
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-02675
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201404-457
value: MEDIUM

Trust: 0.6

VULHUB: VHN-58298
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5017
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02675
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-58298
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02675 // VULHUB: VHN-58298 // JVNDB: JVNDB-2012-006199 // CNNVD: CNNVD-201404-457 // NVD: CVE-2012-5017

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-58298 // JVNDB: JVNDB-2012-006199 // NVD: CVE-2012-5017

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-457

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 78099 // CNNVD: CNNVD-201404-457

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006199

PATCH

title:Release Notes for Cisco IOS Release 15.1SYurl:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf

Trust: 0.8

title:Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2014-02675)url:https://www.cnvd.org.cn/patchInfo/show/45182

Trust: 0.6

title:Cisco IOS Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164610

Trust: 0.6

sources: CNVD: CNVD-2014-02675 // JVNDB: JVNDB-2012-006199 // CNNVD: CNNVD-201404-457

EXTERNAL IDS

db:NVDid:CVE-2012-5017

Trust: 3.4

db:JVNDBid:JVNDB-2012-006199

Trust: 0.8

db:CNNVDid:CNNVD-201404-457

Trust: 0.7

db:CNVDid:CNVD-2014-02675

Trust: 0.6

db:BIDid:78099

Trust: 0.4

db:VULHUBid:VHN-58298

Trust: 0.1

sources: CNVD: CNVD-2014-02675 // VULHUB: VHN-58298 // BID: 78099 // JVNDB: JVNDB-2012-006199 // CNNVD: CNNVD-201404-457 // NVD: CVE-2012-5017

REFERENCES

url:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1sy/release_notes.pdf

Trust: 2.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5017

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5017

Trust: 0.8

url:http://www.cisco.com/go/psirt

Trust: 0.6

sources: CNVD: CNVD-2014-02675 // VULHUB: VHN-58298 // BID: 78099 // JVNDB: JVNDB-2012-006199 // CNNVD: CNNVD-201404-457 // NVD: CVE-2012-5017

CREDITS

Unknown

Trust: 0.3

sources: BID: 78099

SOURCES

db:CNVDid:CNVD-2014-02675
db:VULHUBid:VHN-58298
db:BIDid:78099
db:JVNDBid:JVNDB-2012-006199
db:CNNVDid:CNNVD-201404-457
db:NVDid:CVE-2012-5017

LAST UPDATE DATE

2024-08-14T14:52:30.677000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02675date:2014-04-28T00:00:00
db:VULHUBid:VHN-58298date:2014-04-23T00:00:00
db:BIDid:78099date:2014-04-23T00:00:00
db:JVNDBid:JVNDB-2012-006199date:2014-04-24T00:00:00
db:CNNVDid:CNNVD-201404-457date:2021-10-08T00:00:00
db:NVDid:CVE-2012-5017date:2021-10-05T14:51:27.070

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02675date:2014-04-28T00:00:00
db:VULHUBid:VHN-58298date:2014-04-23T00:00:00
db:BIDid:78099date:2014-04-23T00:00:00
db:JVNDBid:JVNDB-2012-006199date:2014-04-24T00:00:00
db:CNNVDid:CNNVD-201404-457date:2014-04-25T00:00:00
db:NVDid:CVE-2012-5017date:2014-04-23T11:52:59.167