ID

VAR-201503-0119


CVE

CVE-2015-0639


TITLE

Cisco IOS XE of Common Flow Table Service disruption in functionality (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001945

DESCRIPTION

The Common Flow Table (CFT) feature in Cisco IOS XE 3.6 and 3.7 before 3.7.1S, 3.8 before 3.8.0S, 3.9 before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S, when MMON or NBAR is enabled, allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets with IPv4 UDP encapsulation, aka Bug ID CSCua79665. Cisco IOS is a popular Internet operating system. Cisco IOS XE Software is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to cause an affected device to reload, resulting in a denial of service condition. These issues are being tracked by Cisco Bug IDs CSCuo25741, CSCub68073, CSCua79665 and CSCuq59131. The vulnerability stems from the program's improper handling of IPv6 packets encapsulated in IPv4 UDP packets. The following versions are affected: Cisco IOS XE Release 3.6, Release 3.7 prior to 3.7.1S, Release 3.8 prior to 3.8.0S, Release 3.9 prior to 3.9.0S, Release 3.10 prior to 3.10.0S, Release 3.11 prior to 3.11.0S, Release 3.12.0S prior to Version 3.12, Version 3.13 before 3.13.0S, Version 3.14 before 3.14.0S, Version 3.15 before 3.15.0S

Trust: 2.52

sources: NVD: CVE-2015-0639 // JVNDB: JVNDB-2015-001945 // CNVD: CNVD-2015-02089 // BID: 73337 // VULHUB: VHN-78585

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02089

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.7s.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s.5

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6

Trust: 1.4

vendor:ciscomodel:ios xescope:eqversion:3.7s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:3.11

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.13.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.15.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.14.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.8

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.10

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.9

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.7.1s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.12.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.12

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.15

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.13

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.9.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.14

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.7

Trust: 0.8

vendor:ciscomodel:ios xe 3.13scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.14scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.15scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.7scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.8scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.9.0s)scope:eqversion:3.9(<

Trust: 0.6

vendor:ciscomodel:ios xe 3.10scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.11scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.12scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.13s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-02089 // BID: 73337 // JVNDB: JVNDB-2015-001945 // CNNVD: CNNVD-201503-568 // NVD: CVE-2015-0639

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0639
value: HIGH

Trust: 1.0

NVD: CVE-2015-0639
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02089
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201503-568
value: HIGH

Trust: 0.6

VULHUB: VHN-78585
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0639
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-02089
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78585
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02089 // VULHUB: VHN-78585 // JVNDB: JVNDB-2015-001945 // CNNVD: CNNVD-201503-568 // NVD: CVE-2015-0639

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78585 // JVNDB: JVNDB-2015-001945 // NVD: CVE-2015-0639

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-568

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201503-568

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001945

PATCH

title:37486url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=37486

Trust: 0.8

title:cisco-sa-20150325-iosxeurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Trust: 0.8

title:37826url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37826

Trust: 0.8

title:cisco-sa-20150325-iosxeurl:http://www.cisco.com/cisco/web/support/JP/112/1128/1128882_cisco-sa-20150325-iosxe-j.html

Trust: 0.8

title:Cisco IOS XE Common Flow Table (CFT) malformed IPv6 packet handling denial of service vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/56798

Trust: 0.6

sources: CNVD: CNVD-2015-02089 // JVNDB: JVNDB-2015-001945

EXTERNAL IDS

db:NVDid:CVE-2015-0639

Trust: 3.4

db:SECTRACKid:1031981

Trust: 1.1

db:JVNDBid:JVNDB-2015-001945

Trust: 0.8

db:CNNVDid:CNNVD-201503-568

Trust: 0.7

db:CNVDid:CNVD-2015-02089

Trust: 0.6

db:BIDid:73337

Trust: 0.3

db:VULHUBid:VHN-78585

Trust: 0.1

sources: CNVD: CNVD-2015-02089 // VULHUB: VHN-78585 // BID: 73337 // JVNDB: JVNDB-2015-001945 // CNNVD: CNNVD-201503-568 // NVD: CVE-2015-0639

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150325-iosxe

Trust: 2.6

url:http://www.securitytracker.com/id/1031981

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0639

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0639

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html

Trust: 0.3

sources: CNVD: CNVD-2015-02089 // VULHUB: VHN-78585 // BID: 73337 // JVNDB: JVNDB-2015-001945 // CNNVD: CNNVD-201503-568 // NVD: CVE-2015-0639

CREDITS

Cisco

Trust: 0.3

sources: BID: 73337

SOURCES

db:CNVDid:CNVD-2015-02089
db:VULHUBid:VHN-78585
db:BIDid:73337
db:JVNDBid:JVNDB-2015-001945
db:CNNVDid:CNNVD-201503-568
db:NVDid:CVE-2015-0639

LAST UPDATE DATE

2024-11-23T22:08:09.718000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02089date:2015-03-31T00:00:00
db:VULHUBid:VHN-78585date:2015-09-04T00:00:00
db:BIDid:73337date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001945date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-568date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0639date:2024-11-21T02:23:27.110

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02089date:2015-03-31T00:00:00
db:VULHUBid:VHN-78585date:2015-03-26T00:00:00
db:BIDid:73337date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001945date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-568date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0639date:2015-03-26T10:59:05.410