ID

VAR-201503-0179


CVE

CVE-2015-0646


TITLE

Cisco IOS and IOS XE of TCP Service disruption in input modules (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001952

DESCRIPTION

Memory leak in the TCP input module in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10.xS before 3.10.5S, and 3.11.xS and 3.12.xS before 3.12.3S allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted TCP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum94811. Cisco IOS is a popular Internet operating system. Cisco IOS and IOS XE Software are prone to a remote denial-of-service vulnerability. Successful exploits may allow attackers to cause a memory leak and reload of an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCum94811. The vulnerability stems from the fact that the program does not properly handle the packet sequence used for the TCP three-way handshake. The following products and versions are affected: Cisco IOS Releases 12.2, 12.4, 15.0, 15.2, 15.3, 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10 .xS version, 3.11.xS version, 3.12.xS version before 3.12.3S

Trust: 2.52

sources: NVD: CVE-2015-0646 // JVNDB: JVNDB-2015-001952 // CNVD: CNVD-2015-02097 // BID: 73340 // VULHUB: VHN-78592

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02097

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 3.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 2.4

vendor:ciscomodel:ios xescope:eqversion:3.5e.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6e.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.11s.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e.1

Trust: 1.0

vendor:ciscomodel:ios 15.3 s2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.3 s1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.3 sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 escope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 e1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xescope:ltversion:3.12.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.11.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.12.3s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3.xxo

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.6.xe

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.10.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.5.xe

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.8.xs from 3.10.5s

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0-15.4

Trust: 0.6

vendor:ciscomodel:ios xe 3.3.xxoscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.5.xescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.6.xescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.8.xs-3.10.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.11.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.12.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 s0cscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 s0bscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 s2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 s1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 cgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 jb1scope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6e.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5e.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5e.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5e.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5e.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3xo.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3xo.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3xo.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4snscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4cgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 sn1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 snscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 t3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 cg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jabscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jaascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 xb12scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jab1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jabscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jaascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja75scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1nscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja100scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 xb11scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 xb10scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m6bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m6ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb5mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb5hscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb50ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb50scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3hscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 ja1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 ey1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0edscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ed1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4japscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jamscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jaz1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jap1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jam1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxi4bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ire3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ird1scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2015-02097 // BID: 73340 // JVNDB: JVNDB-2015-001952 // CNNVD: CNNVD-201503-575 // NVD: CVE-2015-0646

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0646
value: HIGH

Trust: 1.0

NVD: CVE-2015-0646
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02097
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201503-575
value: HIGH

Trust: 0.6

VULHUB: VHN-78592
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0646
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-02097
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78592
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02097 // VULHUB: VHN-78592 // JVNDB: JVNDB-2015-001952 // CNNVD: CNNVD-201503-575 // NVD: CVE-2015-0646

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78592 // JVNDB: JVNDB-2015-001952 // NVD: CVE-2015-0646

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-575

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201503-575

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001952

PATCH

title:cisco-sa-20150325-tcpleakurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak

Trust: 0.8

title:37821url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37821

Trust: 0.8

title:cisco-sa-20150325-tcpleakurl:http://www.cisco.com/cisco/web/support/JP/112/1128/1128878_cisco-sa-20150325-tcpleak-j.html

Trust: 0.8

title:Patch for Cisco IOS TCP Input Module Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/56817

Trust: 0.6

sources: CNVD: CNVD-2015-02097 // JVNDB: JVNDB-2015-001952

EXTERNAL IDS

db:NVDid:CVE-2015-0646

Trust: 3.4

db:BIDid:73340

Trust: 1.4

db:SECTRACKid:1031980

Trust: 1.1

db:JVNDBid:JVNDB-2015-001952

Trust: 0.8

db:CNNVDid:CNNVD-201503-575

Trust: 0.7

db:CNVDid:CNVD-2015-02097

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-78592

Trust: 0.1

sources: CNVD: CNVD-2015-02097 // VULHUB: VHN-78592 // BID: 73340 // JVNDB: JVNDB-2015-001952 // CNNVD: CNNVD-201503-575 // NVD: CVE-2015-0646

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150325-tcpleak

Trust: 2.6

url:http://www.securityfocus.com/bid/73340

Trust: 1.1

url:http://www.securitytracker.com/id/1031980

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0646

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0646

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37821

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2015-02097 // VULHUB: VHN-78592 // BID: 73340 // JVNDB: JVNDB-2015-001952 // CNNVD: CNNVD-201503-575 // NVD: CVE-2015-0646

CREDITS

Cisco

Trust: 0.3

sources: BID: 73340

SOURCES

db:CNVDid:CNVD-2015-02097
db:VULHUBid:VHN-78592
db:BIDid:73340
db:JVNDBid:JVNDB-2015-001952
db:CNNVDid:CNNVD-201503-575
db:NVDid:CVE-2015-0646

LAST UPDATE DATE

2024-11-23T21:01:41.253000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02097date:2015-03-31T00:00:00
db:VULHUBid:VHN-78592date:2017-05-12T00:00:00
db:BIDid:73340date:2017-05-23T16:24:00
db:JVNDBid:JVNDB-2015-001952date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-575date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0646date:2024-11-21T02:23:27.950

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02097date:2015-03-31T00:00:00
db:VULHUBid:VHN-78592date:2015-03-26T00:00:00
db:BIDid:73340date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001952date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-575date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0646date:2015-03-26T10:59:11.613