ID

VAR-201504-0275


CVE

CVE-2015-0695


TITLE

Cisco ASR 9000 Runs on the device Cisco IOS XR Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-002382

DESCRIPTION

Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card hangs and reloads) by triggering use of a BVI interface for IPv4 packets, aka Bug ID CSCur62957. Vendors have confirmed this vulnerability Bug ID CSCur62957 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS XR Software. Allows an attacker to exploit this vulnerability to initiate a denial of service attack. The vulnerability is caused by the incorrect handling of the bridge-group virtual interface (BVI )flow

Trust: 2.52

sources: NVD: CVE-2015-0695 // JVNDB: JVNDB-2015-002382 // CNVD: CNVD-2015-02658 // BID: 74162 // VULHUB: VHN-78641

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02658

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:eqversion:5.1.1

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:5.2.0

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:5.2.1

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:5.1.2

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:4.3.3

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:4.3.1

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:5.1.0

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:4.3.0

Trust: 1.6

vendor:ciscomodel:ios xrscope:eqversion:4.3.2

Trust: 1.6

vendor:ciscomodel:asr 9001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9010 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9904 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9912 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9922 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xrscope:eqversion:4.3.4 to 5.3.0

Trust: 0.8

vendor:ciscomodel:ios xr softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xr softwarescope:eqversion:5.2.1

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:5.1.2

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:5.1.1

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:4.3.3

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:4.3.1

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:asr 9001-sscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asrscope:eqversion:9001-

Trust: 0.3

vendor:ciscomodel:asrscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:neversion:5.2.2

Trust: 0.3

sources: CNVD: CNVD-2015-02658 // BID: 74162 // JVNDB: JVNDB-2015-002382 // CNNVD: CNNVD-201504-376 // NVD: CVE-2015-0695

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0695
value: HIGH

Trust: 1.0

NVD: CVE-2015-0695
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02658
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201504-376
value: HIGH

Trust: 0.6

VULHUB: VHN-78641
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0695
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-02658
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78641
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02658 // VULHUB: VHN-78641 // JVNDB: JVNDB-2015-002382 // CNNVD: CNNVD-201504-376 // NVD: CVE-2015-0695

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-399

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-78641 // JVNDB: JVNDB-2015-002382 // NVD: CVE-2015-0695

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201504-376

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201504-376

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002382

PATCH

title:cisco-sa-20150415-iosxrurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr

Trust: 0.8

title:38182url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38182

Trust: 0.8

title:Patch for Cisco IOS XR Software Denial of Service Vulnerability (CNVD-2015-02658)url:https://www.cnvd.org.cn/patchInfo/show/57647

Trust: 0.6

sources: CNVD: CNVD-2015-02658 // JVNDB: JVNDB-2015-002382

EXTERNAL IDS

db:NVDid:CVE-2015-0695

Trust: 3.4

db:BIDid:74162

Trust: 2.0

db:SECTRACKid:1032139

Trust: 1.1

db:JVNDBid:JVNDB-2015-002382

Trust: 0.8

db:CNNVDid:CNNVD-201504-376

Trust: 0.7

db:CNVDid:CNVD-2015-02658

Trust: 0.6

db:VULHUBid:VHN-78641

Trust: 0.1

sources: CNVD: CNVD-2015-02658 // VULHUB: VHN-78641 // BID: 74162 // JVNDB: JVNDB-2015-002382 // CNNVD: CNNVD-201504-376 // NVD: CVE-2015-0695

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150415-iosxr

Trust: 2.3

url:http://www.securityfocus.com/bid/74162

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0695

Trust: 1.4

url:http://www.securitytracker.com/id/1032139

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0695

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/ps5845/index.html

Trust: 0.3

sources: CNVD: CNVD-2015-02658 // VULHUB: VHN-78641 // BID: 74162 // JVNDB: JVNDB-2015-002382 // CNNVD: CNNVD-201504-376 // NVD: CVE-2015-0695

CREDITS

Cisco TAC

Trust: 0.3

sources: BID: 74162

SOURCES

db:CNVDid:CNVD-2015-02658
db:VULHUBid:VHN-78641
db:BIDid:74162
db:JVNDBid:JVNDB-2015-002382
db:CNNVDid:CNNVD-201504-376
db:NVDid:CVE-2015-0695

LAST UPDATE DATE

2024-11-23T21:55:01.073000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02658date:2015-04-22T00:00:00
db:VULHUBid:VHN-78641date:2017-01-06T00:00:00
db:BIDid:74162date:2015-05-12T19:51:00
db:JVNDBid:JVNDB-2015-002382date:2015-04-21T00:00:00
db:CNNVDid:CNNVD-201504-376date:2015-04-17T00:00:00
db:NVDid:CVE-2015-0695date:2024-11-21T02:23:33.193

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02658date:2015-04-22T00:00:00
db:VULHUBid:VHN-78641date:2015-04-17T00:00:00
db:BIDid:74162date:2015-04-15T00:00:00
db:JVNDBid:JVNDB-2015-002382date:2015-04-21T00:00:00
db:CNNVDid:CNNVD-201504-376date:2015-04-17T00:00:00
db:NVDid:CVE-2015-0695date:2015-04-17T01:59:26.263