ID

VAR-201404-0063


CVE

CVE-2012-1366


TITLE

ASR 1000 Run on device Cisco IOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-006192

DESCRIPTION

Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. IOS is prone to a denial-of-service vulnerability. A security vulnerability exists in Cisco IOS Release 15.1(1) on ASR 1000 devices

Trust: 2.52

sources: NVD: CVE-2012-1366 // JVNDB: JVNDB-2012-006192 // CNVD: CNVD-2014-02643 // BID: 78241 // VULHUB: VHN-54647

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02643

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 2.5

vendor:ciscomodel:asr 1002 fixed routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1013scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9000 rsp440 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1023 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002-xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1004scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 fixed routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002-x routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1004 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1013 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1023 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9000 series rsp440scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:ltversion:15.1(1)sy

Trust: 0.8

vendor:ciscomodel:asr routerscope:eqversion:1001

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1002-x

Trust: 0.6

vendor:ciscomodel:asr fixed routerscope:eqversion:1002

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1002

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1004

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1006

Trust: 0.6

vendor:ciscomodel:asr routerscope:eqversion:1023

Trust: 0.6

vendor:ciscomodel:asr rsp440 routerscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:asr rsp440 routerscope:eqversion:9000-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1023-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1013-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1006-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1004-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002-x-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002-

Trust: 0.3

vendor:ciscomodel:asr fixed routerscope:eqversion:1002-

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1001-

Trust: 0.3

sources: CNVD: CNVD-2014-02643 // BID: 78241 // JVNDB: JVNDB-2012-006192 // CNNVD: CNNVD-201404-448 // NVD: CVE-2012-1366

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1366
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1366
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-02643
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201404-448
value: MEDIUM

Trust: 0.6

VULHUB: VHN-54647
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1366
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02643
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-54647
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02643 // VULHUB: VHN-54647 // JVNDB: JVNDB-2012-006192 // CNNVD: CNNVD-201404-448 // NVD: CVE-2012-1366

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-54647 // JVNDB: JVNDB-2012-006192 // NVD: CVE-2012-1366

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201404-448

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 78241 // CNNVD: CNNVD-201404-448

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006192

PATCH

title:Release Notes for Cisco IOS Release 15.1SYurl:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf

Trust: 0.8

title:Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2014-02643)url:https://www.cnvd.org.cn/patchInfo/show/45176

Trust: 0.6

title:Cisco IOS on ASR 1000 devices Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164609

Trust: 0.6

sources: CNVD: CNVD-2014-02643 // JVNDB: JVNDB-2012-006192 // CNNVD: CNNVD-201404-448

EXTERNAL IDS

db:NVDid:CVE-2012-1366

Trust: 3.4

db:JVNDBid:JVNDB-2012-006192

Trust: 0.8

db:CNNVDid:CNNVD-201404-448

Trust: 0.7

db:CNVDid:CNVD-2014-02643

Trust: 0.6

db:BIDid:78241

Trust: 0.4

db:VULHUBid:VHN-54647

Trust: 0.1

sources: CNVD: CNVD-2014-02643 // VULHUB: VHN-54647 // BID: 78241 // JVNDB: JVNDB-2012-006192 // CNNVD: CNNVD-201404-448 // NVD: CVE-2012-1366

REFERENCES

url:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1sy/release_notes.pdf

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1366

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1366

Trust: 0.8

sources: CNVD: CNVD-2014-02643 // VULHUB: VHN-54647 // BID: 78241 // JVNDB: JVNDB-2012-006192 // CNNVD: CNNVD-201404-448 // NVD: CVE-2012-1366

CREDITS

Unknown

Trust: 0.3

sources: BID: 78241

SOURCES

db:CNVDid:CNVD-2014-02643
db:VULHUBid:VHN-54647
db:BIDid:78241
db:JVNDBid:JVNDB-2012-006192
db:CNNVDid:CNNVD-201404-448
db:NVDid:CVE-2012-1366

LAST UPDATE DATE

2024-08-14T14:34:10.262000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02643date:2014-04-25T00:00:00
db:VULHUBid:VHN-54647date:2014-04-23T00:00:00
db:BIDid:78241date:2014-04-23T00:00:00
db:JVNDBid:JVNDB-2012-006192date:2014-04-24T00:00:00
db:CNNVDid:CNNVD-201404-448date:2021-10-08T00:00:00
db:NVDid:CVE-2012-1366date:2021-10-05T14:51:27.063

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02643date:2014-04-25T00:00:00
db:VULHUBid:VHN-54647date:2014-04-23T00:00:00
db:BIDid:78241date:2014-04-23T00:00:00
db:JVNDBid:JVNDB-2012-006192date:2014-04-24T00:00:00
db:CNNVDid:CNNVD-201404-448date:2014-04-25T00:00:00
db:NVDid:CVE-2012-1366date:2014-04-23T11:52:59.010