ID

VAR-201507-0231


CVE

CVE-2015-0681


TITLE

Cisco IOS and IOS XE of TFTP Service disruption at the server (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-003928

DESCRIPTION

The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733. Vendors have confirmed this vulnerability Bug ID CSCts66733 It is released as.Service disruption by a third party ( Device hang or reload ) There is a possibility of being put into a state. A remote attacker could exploit the vulnerability to cause a denial of service (device hangs or reloads). This issue is being tracked by Cisco Bug ID CSCts66733. The following products and versions are affected: Cisco IOS 12.2(44)SQ1 release, 12.2(33)XN1 release, 12.4(25e)JAM1 release, 12.4(25e)JAO5m release, 12.4(23)JY release, 15.0(2)ED1 release , 15.0(2) EY3 version, 15.1(3) SVF4a version, 15.2(2) JB1 version; IOS XE 2.5.x version, 2.6.x version, 3.1.xS version, 3.2.xS version, 3.3.xS version, 3.4 .xS version, 3.5.xS version before 3.6.0S, 3.1.xSG version, 3.2.xSG version, 3.3.xSG version before 3.4.0SG, 3.2.xSE version before 3.3.0SE, 3.2.xXO version before 3.3.0XO, 3.2.xSQ version, 3.3.xSQ version, 3.4.xSQ version

Trust: 2.52

sources: NVD: CVE-2015-0681 // JVNDB: JVNDB-2015-003928 // CNVD: CNVD-2015-04986 // BID: 75995 // VULHUB: VHN-78627

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-04986

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.4\(23\)jy

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1\(3\)svf4a

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3sq.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)xn1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jam1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jao5m

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(44\)sq1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)jb1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ey3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ed1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.6.2

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.6.1

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5.2

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5.1

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:3.5s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2se.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1sg.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sq.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2xo.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sq.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2se.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.9

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.8

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2se.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2se.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2xo.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sq.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2sg.7

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1sg.0

Trust: 1.0

vendor:ciscomodel:ios 12.2 sq1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2 xn1scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xescope:ltversion:3.2.xxo

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.4.0sg

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.2.xse

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.2(2)jb1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2(44)sq1

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.1.xs

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0(2)ed1

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.4.xs

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2(33)xn1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.2.xsq

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3.0xo

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.3.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:2.6.x

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.5.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.2.xsg

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0(2)ey3

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.1.xsg

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3.0se

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.1(3)svf4a

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.4.xsq

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.4(23)jy

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.6.0s

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.4(25e)jam1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3.xsq

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.2.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.3.xsg

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.4(25e)jao5m

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:2.5.x

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.5.x

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:2.6.x

Trust: 0.6

vendor:ciscomodel:ios 12.4 jam1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 jao5mscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 jyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0 ed1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0 ey3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 svf4ascope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 jb1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.5.xsscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.1.xsgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.2.xsgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.3.xsgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.2.xsescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.2.xxoscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.2.xsqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.3.xsqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.4.xsqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 gc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sy2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 syscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-04986 // BID: 75995 // JVNDB: JVNDB-2015-003928 // CNNVD: CNNVD-201507-738 // NVD: CVE-2015-0681

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0681
value: HIGH

Trust: 1.0

NVD: CVE-2015-0681
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-04986
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201507-738
value: HIGH

Trust: 0.6

VULHUB: VHN-78627
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0681
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-04986
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78627
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-04986 // VULHUB: VHN-78627 // JVNDB: JVNDB-2015-003928 // CNNVD: CNNVD-201507-738 // NVD: CVE-2015-0681

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78627 // JVNDB: JVNDB-2015-003928 // NVD: CVE-2015-0681

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201507-738

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201507-738

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003928

PATCH

title:cisco-sa-20150722-tftpurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp

Trust: 0.8

title:cisco-sa-20150722-tftp_cvrfurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml

Trust: 0.8

title:39988url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39988

Trust: 0.8

title:cisco-sa-20150722-tftpurl:http://www.cisco.com/cisco/web/support/JP/113/1130/1130210_cisco-sa-20150722-tftp-j.html

Trust: 0.8

title:Patch for Cisco IOS and IOS XE Software Denial of Service Vulnerability (CNVD-2015-04986)url:https://www.cnvd.org.cn/patchInfo/show/61680

Trust: 0.6

sources: CNVD: CNVD-2015-04986 // JVNDB: JVNDB-2015-003928

EXTERNAL IDS

db:NVDid:CVE-2015-0681

Trust: 3.4

db:BIDid:75995

Trust: 1.6

db:SECTRACKid:1033023

Trust: 1.1

db:JVNDBid:JVNDB-2015-003928

Trust: 0.8

db:CNNVDid:CNNVD-201507-738

Trust: 0.7

db:CNVDid:CNVD-2015-04986

Trust: 0.6

db:VULHUBid:VHN-78627

Trust: 0.1

sources: CNVD: CNVD-2015-04986 // VULHUB: VHN-78627 // BID: 75995 // JVNDB: JVNDB-2015-003928 // CNNVD: CNNVD-201507-738 // NVD: CVE-2015-0681

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp

Trust: 2.6

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml

Trust: 1.7

url:http://www.securitytracker.com/id/1033023

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0681

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0681

Trust: 0.8

url:http://www.securityfocus.com/bid/75995

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39988

Trust: 0.3

sources: CNVD: CNVD-2015-04986 // VULHUB: VHN-78627 // BID: 75995 // JVNDB: JVNDB-2015-003928 // CNNVD: CNNVD-201507-738 // NVD: CVE-2015-0681

CREDITS

Cisco and Zhangzhibing of team vhunter

Trust: 0.9

sources: BID: 75995 // CNNVD: CNNVD-201507-738

SOURCES

db:CNVDid:CNVD-2015-04986
db:VULHUBid:VHN-78627
db:BIDid:75995
db:JVNDBid:JVNDB-2015-003928
db:CNNVDid:CNNVD-201507-738
db:NVDid:CVE-2015-0681

LAST UPDATE DATE

2024-11-23T22:45:56.977000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-04986date:2015-08-03T00:00:00
db:VULHUBid:VHN-78627date:2017-09-21T00:00:00
db:BIDid:75995date:2015-07-22T00:00:00
db:JVNDBid:JVNDB-2015-003928date:2015-07-28T00:00:00
db:CNNVDid:CNNVD-201507-738date:2015-07-27T00:00:00
db:NVDid:CVE-2015-0681date:2024-11-21T02:23:31.687

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-04986date:2015-07-28T00:00:00
db:VULHUBid:VHN-78627date:2015-07-24T00:00:00
db:BIDid:75995date:2015-07-22T00:00:00
db:JVNDBid:JVNDB-2015-003928date:2015-07-28T00:00:00
db:CNNVDid:CNNVD-201507-738date:2015-07-23T00:00:00
db:NVDid:CVE-2015-0681date:2015-07-24T16:59:00.067