var-201509-0021
Vulnerability from variot
The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun72171. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This issue is being tracked by Cisco Bug ID CSCun72171
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201509-0021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2.0_base" }, { "model": "asr 9001", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9912", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9006", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9904", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9922", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9000 series aggregation service router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.2.0(ed) base" }, { "model": "ios xr base", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2.0" }, { "model": "asr series aggregation services routers 5.2.0", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "BID", "id": "76791" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNNVD", "id": "CNNVD-201509-384" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:asr_9000_series_aggregation_services_routers", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004947" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "76791" } ], "trust": 0.3 }, "cve": "CVE-2015-6301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2015-6301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-06206", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84262", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-6301", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-6301", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2015-06206", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201509-384", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-84262", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "VULHUB", "id": "VHN-84262" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNNVD", "id": "CNNVD-201509-384" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun72171. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. \nThis issue is being tracked by Cisco Bug ID CSCun72171", "sources": [ { "db": "NVD", "id": "CVE-2015-6301" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "BID", "id": "76791" }, { "db": "VULHUB", "id": "VHN-84262" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6301", "trust": 3.4 }, { "db": "SECTRACK", "id": "1033623", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-004947", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-384", "trust": 0.7 }, { "db": "NSFOCUS", "id": "30948", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2015-06206", "trust": 0.6 }, { "db": "BID", "id": "76791", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-84262", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "VULHUB", "id": "VHN-84262" }, { "db": "BID", "id": "76791" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNNVD", "id": "CNNVD-201509-384" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "id": "VAR-201509-0021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "VULHUB", "id": "VHN-84262" } ], "trust": 1.34285713 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" } ] }, "last_update_date": "2024-11-23T22:34:56.884000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "41101", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41101" }, { "title": "Patch for Cisco IOS DHCPv6 Server Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/64396" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84262" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=41101" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033623" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6301" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6301" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/30948" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "VULHUB", "id": "VHN-84262" }, { "db": "BID", "id": "76791" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNNVD", "id": "CNNVD-201509-384" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-06206" }, { "db": "VULHUB", "id": "VHN-84262" }, { "db": "BID", "id": "76791" }, { "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "db": "CNNVD", "id": "CNNVD-201509-384" }, { "db": "NVD", "id": "CVE-2015-6301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-06206" }, { "date": "2015-09-20T00:00:00", "db": "VULHUB", "id": "VHN-84262" }, { "date": "2015-09-18T00:00:00", "db": "BID", "id": "76791" }, { "date": "2015-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "date": "2015-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-384" }, { "date": "2015-09-20T14:59:06.960000", "db": "NVD", "id": "CVE-2015-6301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-06206" }, { "date": "2016-12-29T00:00:00", "db": "VULHUB", "id": "VHN-84262" }, { "date": "2015-09-18T00:00:00", "db": "BID", "id": "76791" }, { "date": "2015-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004947" }, { "date": "2015-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-384" }, { "date": "2024-11-21T02:34:44.060000", "db": "NVD", "id": "CVE-2015-6301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-384" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASR 9000 Run on device Cisco IOS of DHCPv6 Service disruption at the server (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004947" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-384" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.