ID

VAR-201503-0156


CVE

CVE-2015-0650


TITLE

Cisco IOS and IOS XE of Service Discovery Gateway Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001956

DESCRIPTION

The Service Discovery Gateway (aka mDNS Gateway) in Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 3.9.xS and 3.10.xS before 3.10.4S, 3.11.xS before 3.11.3S, 3.12.xS before 3.12.2S, and 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (device reload) by sending malformed mDNS UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCup70579. Cisco IOS is a popular Internet operating system. Cisco IOS and IOS XE Software are prone to a remote denial-of-service vulnerability. Successful exploits may allow attackers to cause the device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCup70579. Service Discovery Gateway (also known as mDNS Gateway, multicast DNS) is a gateway used to provide how to use common DNS programming interfaces (package format and operation semantics) in a small network without DNS services. The following products and versions are affected: Cisco IOS Releases 12.2, 12.4, 15.0, 15.2, 15.3, 15.4 and IOS XE 3.9.xS, 3.10.xS prior to 3.10.4S, 3.11.xS prior to 3.11.3S Version, 3.12.xS version before 3.12.2S, 3.13.xS version before 3.13.1S

Trust: 2.61

sources: NVD: CVE-2015-0650 // JVNDB: JVNDB-2015-001956 // CNVD: CNVD-2015-02082 // BID: 73335 // VULHUB: VHN-78596 // VULMON: CVE-2015-0650

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02082

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 3.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 2.4

vendor:ciscomodel:ios xescope:eqversion:3.13s.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.12s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.10s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0a

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:3.13.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.11.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.13.1s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.12.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.11.3s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.12.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.9.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.10.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.10.4s

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0-15.4

Trust: 0.6

vendor:ciscomodel:ios xe 3.9.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.10.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.11.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.12.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.13.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 sn1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 snscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 s1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 s2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 escope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.13s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.13s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.13s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4snscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jabscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jab1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1nscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sy3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sy2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0edscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ed1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4japscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jamscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jaz1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jap1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jam1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxi4bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ire3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ird1scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-02082 // BID: 73335 // JVNDB: JVNDB-2015-001956 // CNNVD: CNNVD-201503-579 // NVD: CVE-2015-0650

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0650
value: HIGH

Trust: 1.0

NVD: CVE-2015-0650
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02082
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201503-579
value: HIGH

Trust: 0.6

VULHUB: VHN-78596
value: HIGH

Trust: 0.1

VULMON: CVE-2015-0650
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0650
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-02082
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78596
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02082 // VULHUB: VHN-78596 // VULMON: CVE-2015-0650 // JVNDB: JVNDB-2015-001956 // CNNVD: CNNVD-201503-579 // NVD: CVE-2015-0650

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78596 // JVNDB: JVNDB-2015-001956 // NVD: CVE-2015-0650

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-579

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201503-579

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001956

PATCH

title:cisco-sa-20150325-mdnsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns

Trust: 0.8

title:37820url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37820

Trust: 0.8

title:cisco-sa-20150325-mdnsurl:http://www.cisco.com/cisco/web/support/JP/112/1128/1128875_cisco-sa-20150325-mdns-j.html

Trust: 0.8

title:Patch for Cisco IOS Service Discovery Gateway Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/56790

Trust: 0.6

title:Cisco: Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150325-mdns

Trust: 0.1

sources: CNVD: CNVD-2015-02082 // VULMON: CVE-2015-0650 // JVNDB: JVNDB-2015-001956

EXTERNAL IDS

db:NVDid:CVE-2015-0650

Trust: 3.5

db:SECTRACKid:1031979

Trust: 1.2

db:JVNDBid:JVNDB-2015-001956

Trust: 0.8

db:CNNVDid:CNNVD-201503-579

Trust: 0.7

db:CNVDid:CNVD-2015-02082

Trust: 0.6

db:BIDid:73335

Trust: 0.4

db:VULHUBid:VHN-78596

Trust: 0.1

db:VULMONid:CVE-2015-0650

Trust: 0.1

sources: CNVD: CNVD-2015-02082 // VULHUB: VHN-78596 // VULMON: CVE-2015-0650 // BID: 73335 // JVNDB: JVNDB-2015-001956 // CNNVD: CNNVD-201503-579 // NVD: CVE-2015-0650

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150325-mdns

Trust: 2.7

url:http://www.securitytracker.com/id/1031979

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0650

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0650

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37820

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/cisco-sa-20150325-mdns

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2015-02082 // VULHUB: VHN-78596 // VULMON: CVE-2015-0650 // BID: 73335 // JVNDB: JVNDB-2015-001956 // CNNVD: CNNVD-201503-579 // NVD: CVE-2015-0650

CREDITS

Cisco

Trust: 0.3

sources: BID: 73335

SOURCES

db:CNVDid:CNVD-2015-02082
db:VULHUBid:VHN-78596
db:VULMONid:CVE-2015-0650
db:BIDid:73335
db:JVNDBid:JVNDB-2015-001956
db:CNNVDid:CNNVD-201503-579
db:NVDid:CVE-2015-0650

LAST UPDATE DATE

2024-11-23T21:44:26.129000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02082date:2015-03-31T00:00:00
db:VULHUBid:VHN-78596date:2015-09-04T00:00:00
db:VULMONid:CVE-2015-0650date:2015-09-04T00:00:00
db:BIDid:73335date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001956date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-579date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0650date:2024-11-21T02:23:28.430

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02082date:2015-03-31T00:00:00
db:VULHUBid:VHN-78596date:2015-03-26T00:00:00
db:VULMONid:CVE-2015-0650date:2015-03-26T00:00:00
db:BIDid:73335date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001956date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-579date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0650date:2015-03-26T10:59:14.990