ID

VAR-201503-0186


CVE

CVE-2015-0645


TITLE

Cisco IOS XE of Layer 4 Redirect Service disruption in functionality (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001951

DESCRIPTION

The Layer 4 Redirect (L4R) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.2S, 3.13 before 3.13.1S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuq59131. Cisco IOS is a popular Internet operating system. Cisco IOS XE Software is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to cause an affected device to reload, resulting in a denial of service condition. These issues are being tracked by Cisco Bug IDs CSCuo25741, CSCub68073, CSCua79665 and CSCuq59131. The following releases are affected: Cisco IOS XE Release 2.x, Release 3.x prior to 3.10.4S, Release 3.11 prior to 3.11.3S, Release 3.12 prior to 3.12.2S, Release 3.13 prior to 3.13.1S, Release 3.14 prior to 3.14.0S, Version 3.15 before 3.15.0S

Trust: 2.52

sources: NVD: CVE-2015-0645 // JVNDB: JVNDB-2015-001951 // CNVD: CNVD-2015-02096 // BID: 73337 // VULHUB: VHN-78591

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02096

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.1s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1s.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.1s.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2s.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2s.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4s.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.x

Trust: 1.4

vendor:ciscomodel:ios xescope:eqversion:3.5s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:3.x

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.15

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.12

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.15.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.13

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.13.1s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.12.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.11.3s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.14

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.14.0s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.11

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.10.4s

Trust: 0.8

vendor:ciscomodel:ios xe 3.xscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.11scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.12scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.14scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.15scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.13scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.5sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.4s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.1s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.13s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-02096 // BID: 73337 // JVNDB: JVNDB-2015-001951 // CNNVD: CNNVD-201503-574 // NVD: CVE-2015-0645

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0645
value: HIGH

Trust: 1.0

NVD: CVE-2015-0645
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02096
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201503-574
value: HIGH

Trust: 0.6

VULHUB: VHN-78591
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0645
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-02096
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78591
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02096 // VULHUB: VHN-78591 // JVNDB: JVNDB-2015-001951 // CNNVD: CNNVD-201503-574 // NVD: CVE-2015-0645

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78591 // JVNDB: JVNDB-2015-001951 // NVD: CVE-2015-0645

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-574

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201503-574

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001951

PATCH

title:cisco-sa-20150325-iosxeurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Trust: 0.8

title:37825url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37825

Trust: 0.8

title:cisco-sa-20150325-iosxeurl:http://www.cisco.com/cisco/web/support/JP/112/1128/1128882_cisco-sa-20150325-iosxe-j.html

Trust: 0.8

title:Patch for Cisco IOS XE Layer 4 Redirect (L4R) Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/56814

Trust: 0.6

sources: CNVD: CNVD-2015-02096 // JVNDB: JVNDB-2015-001951

EXTERNAL IDS

db:NVDid:CVE-2015-0645

Trust: 3.4

db:SECTRACKid:1031981

Trust: 1.1

db:JVNDBid:JVNDB-2015-001951

Trust: 0.8

db:CNNVDid:CNNVD-201503-574

Trust: 0.7

db:CNVDid:CNVD-2015-02096

Trust: 0.6

db:BIDid:73337

Trust: 0.3

db:VULHUBid:VHN-78591

Trust: 0.1

sources: CNVD: CNVD-2015-02096 // VULHUB: VHN-78591 // BID: 73337 // JVNDB: JVNDB-2015-001951 // CNNVD: CNNVD-201503-574 // NVD: CVE-2015-0645

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150325-iosxe

Trust: 2.6

url:http://www.securitytracker.com/id/1031981

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0645

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0645

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html

Trust: 0.3

sources: CNVD: CNVD-2015-02096 // VULHUB: VHN-78591 // BID: 73337 // JVNDB: JVNDB-2015-001951 // CNNVD: CNNVD-201503-574 // NVD: CVE-2015-0645

CREDITS

Cisco

Trust: 0.3

sources: BID: 73337

SOURCES

db:CNVDid:CNVD-2015-02096
db:VULHUBid:VHN-78591
db:BIDid:73337
db:JVNDBid:JVNDB-2015-001951
db:CNNVDid:CNNVD-201503-574
db:NVDid:CVE-2015-0645

LAST UPDATE DATE

2024-11-23T22:08:09.754000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02096date:2015-03-31T00:00:00
db:VULHUBid:VHN-78591date:2015-09-04T00:00:00
db:BIDid:73337date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001951date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-574date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0645date:2024-11-21T02:23:27.827

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02096date:2015-03-31T00:00:00
db:VULHUBid:VHN-78591date:2015-03-26T00:00:00
db:BIDid:73337date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001951date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-574date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0645date:2015-03-26T10:59:10.753