ID

VAR-201610-0298


CVE

CVE-2016-6382


TITLE

Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-005151

DESCRIPTION

Cisco IOS 15.2 through 15.6 and IOS XE 3.6 through 3.17 and 16.1 allow remote attackers to cause a denial of service (device restart) via a malformed IPv6 Protocol Independent Multicast (PIM) register packet, aka Bug ID CSCuy16399. Cisco IOS and IOS XE There is a service disruption ( Reboot device ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS/IOSXESoftware has a denial of service vulnerability in the multicast subsystem. An unauthenticated remote attacker exploiting this vulnerability could cause the affected device to be overloaded. This vulnerability is located in both IPv4MSDP and IPv6PIM. These issues are being tracked by Cisco Bug IDs CSCud36767 and CSCuy16399

Trust: 2.61

sources: NVD: CVE-2016-6382 // JVNDB: JVNDB-2016-005151 // CNVD: CNVD-2016-08398 // BID: 93211 // VULHUB: VHN-95202 // VULMON: CVE-2016-6382

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-08398

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.12.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.14.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6.4e

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13.2s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s4

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.12.4s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.16.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.10.4s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2a\)e1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)m

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.2ae

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.0as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)ea

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.1.2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.3e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)ea2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1xbs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)t1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.2e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)cg1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)eb2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(1\)sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)m0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.6s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.1.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)m1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)m2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.7s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)t3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2bs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)cg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)sn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)t1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)ea

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)ea3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s7

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.0cs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2ts

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.2as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)eb

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)ea1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.4s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)sy

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)eb1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3m\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)cg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.0e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)ea1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.1cs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3a\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)t3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.0as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)m3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)sy1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t0a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)ea3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4m\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2 to 15.6

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:16.1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.6 to 3.17

Trust: 0.8

vendor:ciscomodel:iosscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix modular managed ethernet switches 15.2 ea3scope:eqversion:8000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix industrial managed ethernet switches 15.2 ea3scope:eqversion:5700

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix industrial distribution switches 15.2 ea3scope:eqversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix industrial ethernet switches 15.2 ea3scope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley armorstratix industrial managed ethernet swit 15.2 ea3scope:eqversion:5700

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2016-08398 // BID: 93211 // JVNDB: JVNDB-2016-005151 // CNNVD: CNNVD-201609-636 // NVD: CVE-2016-6382

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6382
value: HIGH

Trust: 1.0

NVD: CVE-2016-6382
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-08398
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201609-636
value: HIGH

Trust: 0.6

VULHUB: VHN-95202
value: HIGH

Trust: 0.1

VULMON: CVE-2016-6382
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-6382
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-08398
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95202
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6382
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-08398 // VULHUB: VHN-95202 // VULMON: CVE-2016-6382 // JVNDB: JVNDB-2016-005151 // CNNVD: CNNVD-201609-636 // NVD: CVE-2016-6382

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-95202 // JVNDB: JVNDB-2016-005151 // NVD: CVE-2016-6382

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201609-636

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201609-636

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005151

PATCH

title:cisco-sa-20160928-msdpurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp

Trust: 0.8

title:Patch for Cisco IOS/IOSmulticast Subsystem Denial of Service Vulnerability (CNVD-2016-08398)url:https://www.cnvd.org.cn/patchInfo/show/82003

Trust: 0.6

title:Cisco IOS and IOS XE Software Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64407

Trust: 0.6

title:Cisco: Cisco IOS and IOS XE Software Multicast Routing Denial of Service Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160928-msdp

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-warns-of-critical-flaw-in-email-security-appliances/120968/

Trust: 0.1

sources: CNVD: CNVD-2016-08398 // VULMON: CVE-2016-6382 // JVNDB: JVNDB-2016-005151 // CNNVD: CNNVD-201609-636

EXTERNAL IDS

db:NVDid:CVE-2016-6382

Trust: 3.5

db:BIDid:93211

Trust: 2.7

db:ICS CERTid:ICSA-16-287-04

Trust: 2.3

db:SECTRACKid:1036914

Trust: 1.2

db:JVNDBid:JVNDB-2016-005151

Trust: 0.8

db:CNNVDid:CNNVD-201609-636

Trust: 0.7

db:CNVDid:CNVD-2016-08398

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-95202

Trust: 0.1

db:VULMONid:CVE-2016-6382

Trust: 0.1

sources: CNVD: CNVD-2016-08398 // VULHUB: VHN-95202 // VULMON: CVE-2016-6382 // BID: 93211 // JVNDB: JVNDB-2016-005151 // CNNVD: CNNVD-201609-636 // NVD: CVE-2016-6382

REFERENCES

url:http://www.securityfocus.com/bid/93211

Trust: 2.4

url:https://ics-cert.us-cert.gov/advisories/icsa-16-287-04

Trust: 2.4

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160928-msdp

Trust: 2.2

url:http://www.securitytracker.com/id/1036914

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6382

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6382

Trust: 0.8

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/cisco-sa-20160928-msdp

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-warns-of-critical-flaw-in-email-security-appliances/120968/

Trust: 0.1

sources: CNVD: CNVD-2016-08398 // VULHUB: VHN-95202 // VULMON: CVE-2016-6382 // BID: 93211 // JVNDB: JVNDB-2016-005151 // CNNVD: CNNVD-201609-636 // NVD: CVE-2016-6382

CREDITS

Cisco

Trust: 0.9

sources: BID: 93211 // CNNVD: CNNVD-201609-636

SOURCES

db:CNVDid:CNVD-2016-08398
db:VULHUBid:VHN-95202
db:VULMONid:CVE-2016-6382
db:BIDid:93211
db:JVNDBid:JVNDB-2016-005151
db:CNNVDid:CNNVD-201609-636
db:NVDid:CVE-2016-6382

LAST UPDATE DATE

2024-11-23T20:21:57.151000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-08398date:2016-10-08T00:00:00
db:VULHUBid:VHN-95202date:2017-07-30T00:00:00
db:VULMONid:CVE-2016-6382date:2017-07-30T00:00:00
db:BIDid:93211date:2017-05-23T16:23:00
db:JVNDBid:JVNDB-2016-005151date:2016-11-10T00:00:00
db:CNNVDid:CNNVD-201609-636date:2016-10-11T00:00:00
db:NVDid:CVE-2016-6382date:2024-11-21T02:56:01.703

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-08398date:2016-10-08T00:00:00
db:VULHUBid:VHN-95202date:2016-10-05T00:00:00
db:VULMONid:CVE-2016-6382date:2016-10-05T00:00:00
db:BIDid:93211date:2016-09-28T00:00:00
db:JVNDBid:JVNDB-2016-005151date:2016-10-13T00:00:00
db:CNNVDid:CNNVD-201609-636date:2016-09-29T00:00:00
db:NVDid:CVE-2016-6382date:2016-10-05T17:59:01.447