ID

VAR-201512-0406


CVE

CVE-2015-6399


TITLE

Cisco Integrated Management Controller of Supervisor Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-006444

DESCRIPTION

The Supervisor 1.0.0.0 and 1.0.0.1 in Cisco Integrated Management Controller (IMC) before 2.0(9) allows remote authenticated users to cause a denial of service (IP interface outage) via crafted parameters in an HTTP request, aka Bug ID CSCuv38286. An attacker can exploit this issue to cause a process crash, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvo36134. A security vulnerability exists in Supervisor 1.0.0.0 and 1.0.0.1 releases prior to Cisco IMC 2.0(9)

Trust: 2.25

sources: NVD: CVE-2015-6399 // JVNDB: JVNDB-2015-006444 // BID: 79031 // BID: 108851 // VULHUB: VHN-84360

AFFECTED PRODUCTS

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:1.0.0.0

Trust: 2.4

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:1.0.0.1

Trust: 2.4

vendor:ciscomodel:integrated management controllerscope:ltversion:2.0(9)

Trust: 0.8

vendor:ciscomodel:integrated management controller 1.4scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified computing system 2.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(8)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(7)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(6)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(5)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(4)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(3)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(2)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:2.0(1)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.5(7)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.5(6)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.5(5)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.5(4)

Trust: 0.3

vendor:ciscomodel:integrated management controller 1.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(8)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(7)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(6)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(5)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(4)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(2)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.4(1)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.3(3)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.3(1)

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:1.2(2)

Trust: 0.3

vendor:ciscomodel:unified computing system 2.0scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ucs c-series serversscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:integrated management controllerscope:eqversion:0

Trust: 0.3

sources: BID: 79031 // BID: 108851 // JVNDB: JVNDB-2015-006444 // CNNVD: CNNVD-201512-441 // NVD: CVE-2015-6399

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6399
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6399
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201512-441
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84360
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6399
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-84360
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-84360 // JVNDB: JVNDB-2015-006444 // CNNVD: CNNVD-201512-441 // NVD: CVE-2015-6399

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-84360 // JVNDB: JVNDB-2015-006444 // NVD: CVE-2015-6399

THREAT TYPE

local

Trust: 0.9

sources: BID: 108851 // CNNVD: CNNVD-201512-441

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201512-441

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006444

PATCH

title:cisco-sa-20151211-imcurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-imc

Trust: 0.8

title:Cisco Integrated Management Controller Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59230

Trust: 0.6

sources: JVNDB: JVNDB-2015-006444 // CNNVD: CNNVD-201512-441

EXTERNAL IDS

db:NVDid:CVE-2015-6399

Trust: 3.1

db:BIDid:108851

Trust: 2.0

db:BIDid:79031

Trust: 1.4

db:SECTRACKid:1038475

Trust: 1.1

db:JVNDBid:JVNDB-2015-006444

Trust: 0.8

db:CNNVDid:CNNVD-201512-441

Trust: 0.7

db:VULHUBid:VHN-84360

Trust: 0.1

sources: VULHUB: VHN-84360 // BID: 79031 // BID: 108851 // JVNDB: JVNDB-2015-006444 // CNNVD: CNNVD-201512-441 // NVD: CVE-2015-6399

REFERENCES

url:http://www.securityfocus.com/bid/108851

Trust: 1.7

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151211-imc

Trust: 1.4

url:http://www.cisco.com/

Trust: 1.2

url:http://www.securityfocus.com/bid/79031

Trust: 1.1

url:http://www.securitytracker.com/id/1038475

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190619-imc-dos

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6399

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6399

Trust: 0.8

sources: VULHUB: VHN-84360 // BID: 79031 // BID: 108851 // JVNDB: JVNDB-2015-006444 // CNNVD: CNNVD-201512-441 // NVD: CVE-2015-6399

CREDITS

Cisco

Trust: 1.2

sources: BID: 79031 // BID: 108851 // CNNVD: CNNVD-201512-441

SOURCES

db:VULHUBid:VHN-84360
db:BIDid:79031
db:BIDid:108851
db:JVNDBid:JVNDB-2015-006444
db:CNNVDid:CNNVD-201512-441
db:NVDid:CVE-2015-6399

LAST UPDATE DATE

2024-11-23T22:11:59.500000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84360date:2017-07-08T00:00:00
db:BIDid:79031date:2017-05-23T16:26:00
db:BIDid:108851date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2015-006444date:2015-12-18T00:00:00
db:CNNVDid:CNNVD-201512-441date:2019-06-24T00:00:00
db:NVDid:CVE-2015-6399date:2024-11-21T02:34:55.653

SOURCES RELEASE DATE

db:VULHUBid:VHN-84360date:2015-12-15T00:00:00
db:BIDid:79031date:2015-12-11T00:00:00
db:BIDid:108851date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2015-006444date:2015-12-18T00:00:00
db:CNNVDid:CNNVD-201512-441date:2015-12-16T00:00:00
db:NVDid:CVE-2015-6399date:2015-12-15T05:59:03.883