ID

VAR-201502-0146


CVE

CVE-2015-0618


TITLE

Network Convergence System 6000 Device and Carrier Routing System X Runs on the device Cisco IOS XR Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001581

DESCRIPTION

Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241. Vendors have confirmed this vulnerability Bug ID CSCuq95241 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlA third party could use a malformed IPv6 Service disruption via packets ( Reload line card ) There is a possibility of being put into a state. Cisco IOS XR is prone to a remote denial-of-service vulnerability

Trust: 1.98

sources: NVD: CVE-2015-0618 // JVNDB: JVNDB-2015-001581 // BID: 72713 // VULHUB: VHN-78564

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:eqversion:5.2.1

Trust: 1.6

vendor:ciscomodel:carrier routing systemscope:eqversion:5.1.3

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:5.0.1

Trust: 1.6

vendor:ciscomodel:carrier routing systemscope:eqversion:5.1.4

Trust: 1.6

vendor:ciscomodel:carrier routing systemscope:ltversion:(ios xr 5.3.0 )

Trust: 0.8

vendor:ciscomodel:ios xrscope:ltversion:5.2.3

Trust: 0.8

vendor:ciscomodel:ios xrscope:ltversion:5.3.0

Trust: 0.8

vendor:ciscomodel:network convergence system 6000 series routerscope:ltversion:(ios xr 5.2.3 )

Trust: 0.8

vendor:ciscomodel:ios xr for cisco network convergence system seriesscope:eqversion:5.0.160000

Trust: 0.3

vendor:ciscomodel:ios xr for cisco network convergence system seriesscope:eqversion:5.0.060000

Trust: 0.3

vendor:ciscomodel:ios xrscope:eqversion:5.1

Trust: 0.3

sources: BID: 72713 // JVNDB: JVNDB-2015-001581 // CNNVD: CNNVD-201502-380 // NVD: CVE-2015-0618

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0618
value: HIGH

Trust: 1.0

NVD: CVE-2015-0618
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201502-380
value: HIGH

Trust: 0.6

VULHUB: VHN-78564
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0618
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-78564
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78564 // JVNDB: JVNDB-2015-001581 // CNNVD: CNNVD-201502-380 // NVD: CVE-2015-0618

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-78564 // JVNDB: JVNDB-2015-001581 // NVD: CVE-2015-0618

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-380

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 72713

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001581

PATCH

title:cisco-sa-20150220-ipv6url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6

Trust: 0.8

title:37510url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37510

Trust: 0.8

title:cisco-sa-20150220-ipv6url:http://www.cisco.com/cisco/web/support/JP/112/1128/1128558_cisco-sa-20150220-ipv6-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2015-001581

EXTERNAL IDS

db:NVDid:CVE-2015-0618

Trust: 2.8

db:BIDid:72713

Trust: 1.4

db:SECTRACKid:1031778

Trust: 1.1

db:JVNDBid:JVNDB-2015-001581

Trust: 0.8

db:CNNVDid:CNNVD-201502-380

Trust: 0.7

db:VULHUBid:VHN-78564

Trust: 0.1

sources: VULHUB: VHN-78564 // BID: 72713 // JVNDB: JVNDB-2015-001581 // CNNVD: CNNVD-201502-380 // NVD: CVE-2015-0618

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150220-ipv6

Trust: 2.0

url:http://www.securityfocus.com/bid/72713

Trust: 1.1

url:http://www.securitytracker.com/id/1031778

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0618

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0618

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37510

Trust: 0.3

sources: VULHUB: VHN-78564 // BID: 72713 // JVNDB: JVNDB-2015-001581 // CNNVD: CNNVD-201502-380 // NVD: CVE-2015-0618

CREDITS

Cisco

Trust: 0.3

sources: BID: 72713

SOURCES

db:VULHUBid:VHN-78564
db:BIDid:72713
db:JVNDBid:JVNDB-2015-001581
db:CNNVDid:CNNVD-201502-380
db:NVDid:CVE-2015-0618

LAST UPDATE DATE

2024-11-23T23:05:43.689000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78564date:2015-11-27T00:00:00
db:BIDid:72713date:2015-02-20T00:00:00
db:JVNDBid:JVNDB-2015-001581date:2015-02-25T00:00:00
db:CNNVDid:CNNVD-201502-380date:2015-02-28T00:00:00
db:NVDid:CVE-2015-0618date:2024-11-21T02:23:25.247

SOURCES RELEASE DATE

db:VULHUBid:VHN-78564date:2015-02-21T00:00:00
db:BIDid:72713date:2015-02-20T00:00:00
db:JVNDBid:JVNDB-2015-001581date:2015-02-25T00:00:00
db:CNNVDid:CNNVD-201502-380date:2015-02-28T00:00:00
db:NVDid:CVE-2015-0618date:2015-02-21T11:59:01.327