ID

VAR-201508-0098


CVE

CVE-2015-6271


TITLE

Cisco ASR 1000 Run on device Cisco IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-004532

DESCRIPTION

Cisco IOS XE 2.1.0 through 2.4.3 and 2.5.0 on ASR 1000 devices, when NAT Application Layer Gateway is used, allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted SIP packet, aka Bug IDs CSCta74749 and CSCta77008. Vendors have confirmed this vulnerability Bug ID CSCta74749 ,and CSCta77008 It is released as.Skillfully crafted by a third party SIP Service disruption via packets ( Embedded service processor crash ) There is a possibility of being put into a state. The Cisco ASR1000 Series Aggregation Services Router provides a WAN edge solution that combines information, communications, collaboration and business. The Cisco ASR 1000 Series Router handles SIP packets with security vulnerabilities, allowing remote attackers to exploit vulnerabilities by sending special packets to crash the target ESP and overload the target device. Cisco IOS XE on ASR 1000 is an operating system developed by Cisco in the ASR 1000 series routers. A security vulnerability exists in Cisco IOS XE Releases 2.1.0 through 2.4.3 and 2.5.0 on Cisco ASR 1000 devices

Trust: 2.25

sources: NVD: CVE-2015-6271 // JVNDB: JVNDB-2015-004532 // CNVD: CNVD-2015-05745 // VULHUB: VHN-84232

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-05745

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:2.1.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.0t

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.1t

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.4.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.3.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.1 .0

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.1 .1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.1 .2

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.1 .3

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.2 .1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.2 .2

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.2 .3

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.3 .0

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.3 .0t

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.3 .1t

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.3 .2

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.4 .0

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.4 .1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.4 .2

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.4 .3

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.5 .0

Trust: 0.8

vendor:ciscomodel:asrscope:eqversion:1000

Trust: 0.6

sources: CNVD: CNVD-2015-05745 // JVNDB: JVNDB-2015-004532 // CNNVD: CNNVD-201508-587 // NVD: CVE-2015-6271

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6271
value: HIGH

Trust: 1.0

NVD: CVE-2015-6271
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-05745
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201508-587
value: HIGH

Trust: 0.6

VULHUB: VHN-84232
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6271
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-05745
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84232
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-05745 // VULHUB: VHN-84232 // JVNDB: JVNDB-2015-004532 // CNNVD: CNNVD-201508-587 // NVD: CVE-2015-6271

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-84232 // JVNDB: JVNDB-2015-004532 // NVD: CVE-2015-6271

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-587

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201508-587

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004532

PATCH

title:40688url:http://tools.cisco.com/security/center/viewAlert.x?alertId=40688

Trust: 0.8

title:Patch for Cisco ASR 1000 Series Router SIP Packet Handling Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/63361

Trust: 0.6

sources: CNVD: CNVD-2015-05745 // JVNDB: JVNDB-2015-004532

EXTERNAL IDS

db:NVDid:CVE-2015-6271

Trust: 3.1

db:SECTRACKid:1033410

Trust: 1.1

db:JVNDBid:JVNDB-2015-004532

Trust: 0.8

db:CNNVDid:CNNVD-201508-587

Trust: 0.7

db:CNVDid:CNVD-2015-05745

Trust: 0.6

db:VULHUBid:VHN-84232

Trust: 0.1

sources: CNVD: CNVD-2015-05745 // VULHUB: VHN-84232 // JVNDB: JVNDB-2015-004532 // CNNVD: CNNVD-201508-587 // NVD: CVE-2015-6271

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40688

Trust: 2.3

url:http://www.securitytracker.com/id/1033410

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6271

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6271

Trust: 0.8

sources: CNVD: CNVD-2015-05745 // VULHUB: VHN-84232 // JVNDB: JVNDB-2015-004532 // CNNVD: CNNVD-201508-587 // NVD: CVE-2015-6271

SOURCES

db:CNVDid:CNVD-2015-05745
db:VULHUBid:VHN-84232
db:JVNDBid:JVNDB-2015-004532
db:CNNVDid:CNNVD-201508-587
db:NVDid:CVE-2015-6271

LAST UPDATE DATE

2024-11-23T22:08:02.043000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-05745date:2015-09-01T00:00:00
db:VULHUBid:VHN-84232date:2017-09-20T00:00:00
db:JVNDBid:JVNDB-2015-004532date:2015-09-02T00:00:00
db:CNNVDid:CNNVD-201508-587date:2015-09-10T00:00:00
db:NVDid:CVE-2015-6271date:2024-11-21T02:34:40.780

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-05745date:2015-09-01T00:00:00
db:VULHUBid:VHN-84232date:2015-08-31T00:00:00
db:JVNDBid:JVNDB-2015-004532date:2015-09-02T00:00:00
db:CNNVDid:CNNVD-201508-587date:2015-08-31T00:00:00
db:NVDid:CVE-2015-6271date:2015-08-31T20:59:05.217