ID

VAR-201406-0311


CVE

CVE-2014-3295


TITLE

Cisco NX-OS Software HSRP Packet Parsing Denial of Service Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2014-03704 // BID: 67983

DESCRIPTION

The HSRP implementation in Cisco NX-OS 6.2(2a) and earlier allows remote attackers to bypass authentication and cause a denial of service (group-member state modification and traffic blackholing) via malformed HSRP packets, aka Bug ID CSCup11309. Vendors have confirmed this vulnerability Bug ID CSCup11309 It is released as.Malformed by a third party HSRP Authentication is avoided and service operation is interrupted via packets. ( Group member state changes and traffic black holes ) There is a possibility of being put into a state. Cisco NX-OS is a data center-level operating system. An attacker could exploit this vulnerability to bypass authentication and convert the status of a group member to SPEAK, causing a denial of service. An attacker can leverage this issue to cause a denial-of-service condition; denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCup11309

Trust: 2.52

sources: NVD: CVE-2014-3295 // JVNDB: JVNDB-2014-002939 // CNVD: CNVD-2014-03704 // BID: 67983 // VULHUB: VHN-71235

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-03704

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(7\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(9\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:lteversion:6.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:lteversion:6.2(2a)

Trust: 0.8

vendor:ciscomodel:nx-os 6.2scope:lteversion:<=

Trust: 0.6

sources: CNVD: CNVD-2014-03704 // JVNDB: JVNDB-2014-002939 // CNNVD: CNNVD-201406-314 // NVD: CVE-2014-3295

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3295
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3295
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-03704
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201406-314
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71235
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3295
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-03704
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71235
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-03704 // VULHUB: VHN-71235 // JVNDB: JVNDB-2014-002939 // CNNVD: CNNVD-201406-314 // NVD: CVE-2014-3295

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-71235 // JVNDB: JVNDB-2014-002939 // NVD: CVE-2014-3295

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201406-314

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201406-314

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002939

PATCH

title:Cisco NX-OS Software HSRP Authentication Denial of Service Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3295

Trust: 0.8

title:34585url:http://tools.cisco.com/security/center/viewAlert.x?alertId=34585

Trust: 0.8

sources: JVNDB: JVNDB-2014-002939

EXTERNAL IDS

db:NVDid:CVE-2014-3295

Trust: 3.4

db:BIDid:67983

Trust: 2.0

db:SECUNIAid:59158

Trust: 1.1

db:SECTRACKid:1030409

Trust: 1.1

db:JVNDBid:JVNDB-2014-002939

Trust: 0.8

db:CNNVDid:CNNVD-201406-314

Trust: 0.7

db:CNVDid:CNVD-2014-03704

Trust: 0.6

db:VULHUBid:VHN-71235

Trust: 0.1

sources: CNVD: CNVD-2014-03704 // VULHUB: VHN-71235 // BID: 67983 // JVNDB: JVNDB-2014-002939 // CNNVD: CNNVD-201406-314 // NVD: CVE-2014-3295

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3295

Trust: 1.7

url:http://tools.cisco.com/security/center/viewalert.x?alertid=34585

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3295

Trust: 1.4

url:http://www.securityfocus.com/bid/67983

Trust: 1.1

url:http://www.securitytracker.com/id/1030409

Trust: 1.1

url:http://secunia.com/advisories/59158

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3295

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2014-03704 // VULHUB: VHN-71235 // BID: 67983 // JVNDB: JVNDB-2014-002939 // CNNVD: CNNVD-201406-314 // NVD: CVE-2014-3295

CREDITS

Cisco

Trust: 0.3

sources: BID: 67983

SOURCES

db:CNVDid:CNVD-2014-03704
db:VULHUBid:VHN-71235
db:BIDid:67983
db:JVNDBid:JVNDB-2014-002939
db:CNNVDid:CNNVD-201406-314
db:NVDid:CVE-2014-3295

LAST UPDATE DATE

2024-11-23T22:49:31.049000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-03704date:2014-06-17T00:00:00
db:VULHUBid:VHN-71235date:2016-09-08T00:00:00
db:BIDid:67983date:2014-06-13T02:12:00
db:JVNDBid:JVNDB-2014-002939date:2014-06-17T00:00:00
db:CNNVDid:CNNVD-201406-314date:2014-06-16T00:00:00
db:NVDid:CVE-2014-3295date:2024-11-21T02:07:48.663

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-03704date:2014-06-17T00:00:00
db:VULHUBid:VHN-71235date:2014-06-14T00:00:00
db:BIDid:67983date:2014-06-10T00:00:00
db:JVNDBid:JVNDB-2014-002939date:2014-06-17T00:00:00
db:CNNVDid:CNNVD-201406-314date:2014-06-16T00:00:00
db:NVDid:CVE-2014-3295date:2014-06-14T04:26:47.173