ID

VAR-201509-0008


CVE

CVE-2015-6282


TITLE

Cisco IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-004953

DESCRIPTION

Cisco IOS XE 2.x and 3.x before 3.10.6S, 3.11.xS through 3.13.xS before 3.13.3S, and 3.14.xS through 3.15.xS before 3.15.1S allows remote attackers to cause a denial of service (device reload) via IPv4 packets that require NAT and MPLS actions, aka Bug ID CSCut96933. Cisco IOS XE There is a service disruption ( Device reload ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The vulnerability could be exploited by a remote attacker to overload the affected device. Attackers can exploit this issue to cause a reload of the affected device, resulting in denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCut96933. The following releases are affected; Cisco IOS XE 2.x releases and 3.x releases prior to 3.10.6S, 3.11.xS releases to 3.13.xS releases prior to 3.13.3S, 3.14.xS releases and 3.15.xS releases prior to 3.15.1S

Trust: 2.52

sources: NVD: CVE-2015-6282 // JVNDB: JVNDB-2015-004953 // CNVD: CNVD-2015-06342 // BID: 76828 // VULHUB: VHN-84243

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-06342

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:2.1.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.0t

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.4.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.1.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.4.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.3.0

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:2.2.2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.4a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.3.1t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.3.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.4.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.2a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.01

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.7

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_base

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.1.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.2

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:3.x

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.13.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.10.6s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.x

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.14.xs from 3.15.1s

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.15.xs

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.11.xs from 3.13.3s

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:2.5.2

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.5.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.4.3

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.4.2

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.4.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.4

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.2.3

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.2.2

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.1.3

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.1.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.4ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.15s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.01scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 2.6.2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.6.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.6.0

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:2.5.0

Trust: 0.3

vendor:ciscomodel:ios xe software 2.3.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 2.3.0tscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-06342 // BID: 76828 // JVNDB: JVNDB-2015-004953 // CNNVD: CNNVD-201509-545 // NVD: CVE-2015-6282

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6282
value: HIGH

Trust: 1.0

NVD: CVE-2015-6282
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-06342
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201509-545
value: HIGH

Trust: 0.6

VULHUB: VHN-84243
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6282
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-06342
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84243
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-06342 // VULHUB: VHN-84243 // JVNDB: JVNDB-2015-004953 // CNNVD: CNNVD-201509-545 // NVD: CVE-2015-6282

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-399

Trust: 1.1

sources: VULHUB: VHN-84243 // JVNDB: JVNDB-2015-004953 // NVD: CVE-2015-6282

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-545

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201509-545

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004953

PATCH

title:cisco-sa-20150923-iosxeurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-iosxe

Trust: 0.8

title:40939url:http://tools.cisco.com/security/center/viewAlert.x?alertId=40939

Trust: 0.8

title:cisco-sa-20150923-iosxeurl:http://www.cisco.com/cisco/web/support/JP/113/1135/1135336_cisco-sa-20150923-iosxe-j.html

Trust: 0.8

title:Patch for Cisco IOS XE Network Address Translation Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/64811

Trust: 0.6

sources: CNVD: CNVD-2015-06342 // JVNDB: JVNDB-2015-004953

EXTERNAL IDS

db:NVDid:CVE-2015-6282

Trust: 3.4

db:SECTRACKid:1033645

Trust: 1.1

db:JVNDBid:JVNDB-2015-004953

Trust: 0.8

db:CNNVDid:CNNVD-201509-545

Trust: 0.7

db:CNVDid:CNVD-2015-06342

Trust: 0.6

db:BIDid:76828

Trust: 0.4

db:VULHUBid:VHN-84243

Trust: 0.1

sources: CNVD: CNVD-2015-06342 // VULHUB: VHN-84243 // BID: 76828 // JVNDB: JVNDB-2015-004953 // CNNVD: CNNVD-201509-545 // NVD: CVE-2015-6282

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150923-iosxe

Trust: 2.6

url:http://www.securitytracker.com/id/1033645

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6282

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6282

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40939

Trust: 0.3

sources: CNVD: CNVD-2015-06342 // VULHUB: VHN-84243 // BID: 76828 // JVNDB: JVNDB-2015-004953 // CNNVD: CNNVD-201509-545 // NVD: CVE-2015-6282

CREDITS

Cisco

Trust: 0.3

sources: BID: 76828

SOURCES

db:CNVDid:CNVD-2015-06342
db:VULHUBid:VHN-84243
db:BIDid:76828
db:JVNDBid:JVNDB-2015-004953
db:CNNVDid:CNNVD-201509-545
db:NVDid:CVE-2015-6282

LAST UPDATE DATE

2024-11-23T22:31:07.045000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-06342date:2015-10-09T00:00:00
db:VULHUBid:VHN-84243date:2017-01-04T00:00:00
db:BIDid:76828date:2015-09-23T00:00:00
db:JVNDBid:JVNDB-2015-004953date:2015-09-30T00:00:00
db:CNNVDid:CNNVD-201509-545date:2015-09-29T00:00:00
db:NVDid:CVE-2015-6282date:2024-11-21T02:34:41.870

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-06342date:2015-10-09T00:00:00
db:VULHUBid:VHN-84243date:2015-09-26T00:00:00
db:BIDid:76828date:2015-09-23T00:00:00
db:JVNDBid:JVNDB-2015-004953date:2015-09-30T00:00:00
db:CNNVDid:CNNVD-201509-545date:2015-09-28T00:00:00
db:NVDid:CVE-2015-6282date:2015-09-26T01:59:06.470