var-201706-0582
Vulnerability from variot
A vulnerability in the forwarding component of Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series Routers could allow an authenticated, local attacker to cause the router to stop forwarding data traffic across Traffic Engineering (TE) tunnels, resulting in a denial of service (DoS) condition. More Information: CSCvd16665. Known Affected Releases: 6.2.11.BASE. Known Fixed Releases: 6.1.3 6.1.2 6.3.1.8i.BASE 6.2.11.8i.BASE 6.2.2.9i.BASE 6.1.32.11i.BASE 6.1.31.10i.BASE 6.1.4.3i.BASE. Vendors have confirmed this vulnerability Bug ID CSCvd16665 It is released as.Denial of service by a local attacker (DoS) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOSXR Software, which can cause a denial of service (process overload) by exploiting a memory leak vulnerability in the gRPC service. A local attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvd16665 . The forwarding component is one of the information forwarding components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0582", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.2" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0_base" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.0" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.1" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.3" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.1" }, { "model": "network convergence system", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55080" }, { "model": "network convergence system series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55000" }, { "model": "ios xr", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios xr software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "BID", "id": "98987" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios_xr", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004943" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco.", "sources": [ { "db": "BID", "id": "98987" }, { "db": "CNNVD", "id": "CNNVD-201706-437" } ], "trust": 0.9 }, "cve": "CVE-2017-6666", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "CVE-2017-6666", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "CNVD-2017-13743", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-114869", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.5, "id": "CVE-2017-6666", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6666", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-6666", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-13743", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201706-437", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-114869", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "VULHUB", "id": "VHN-114869" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the forwarding component of Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series Routers could allow an authenticated, local attacker to cause the router to stop forwarding data traffic across Traffic Engineering (TE) tunnels, resulting in a denial of service (DoS) condition. More Information: CSCvd16665. Known Affected Releases: 6.2.11.BASE. Known Fixed Releases: 6.1.3 6.1.2 6.3.1.8i.BASE 6.2.11.8i.BASE 6.2.2.9i.BASE 6.1.32.11i.BASE 6.1.31.10i.BASE 6.1.4.3i.BASE. Vendors have confirmed this vulnerability Bug ID CSCvd16665 It is released as.Denial of service by a local attacker (DoS) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOSXR Software, which can cause a denial of service (process overload) by exploiting a memory leak vulnerability in the gRPC service. \nA local attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCvd16665 . The forwarding component is one of the information forwarding components", "sources": [ { "db": "NVD", "id": "CVE-2017-6666" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "BID", "id": "98987" }, { "db": "VULHUB", "id": "VHN-114869" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6666", "trust": 3.4 }, { "db": "BID", "id": "98987", "trust": 2.6 }, { "db": "SECTRACK", "id": "1038630", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-004943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201706-437", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-13743", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-114869", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "VULHUB", "id": "VHN-114869" }, { "db": "BID", "id": "98987" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "id": "VAR-201706-0582", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "VULHUB", "id": "VHN-114869" } ], "trust": 1.2257565533333334 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" } ] }, "last_update_date": "2024-11-23T22:07:21.478000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170607-ncs", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ncs" }, { "title": "Patch for Cisco IOSXR Software Local Denial of Service Vulnerability (CNVD-2017-13743)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/97785" }, { "title": "Cisco Network Convergence System 5500 Series IOS XR Software forwarding Fixes for component resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75153" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114869" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170607-ncs" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/98987" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038630" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6666" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6666" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "VULHUB", "id": "VHN-114869" }, { "db": "BID", "id": "98987" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-13743" }, { "db": "VULHUB", "id": "VHN-114869" }, { "db": "BID", "id": "98987" }, { "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "db": "CNNVD", "id": "CNNVD-201706-437" }, { "db": "NVD", "id": "CVE-2017-6666" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "CNVD", "id": "CNVD-2017-13743" }, { "date": "2017-06-13T00:00:00", "db": "VULHUB", "id": "VHN-114869" }, { "date": "2017-06-07T00:00:00", "db": "BID", "id": "98987" }, { "date": "2017-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "date": "2017-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-437" }, { "date": "2017-06-13T06:29:00.973000", "db": "NVD", "id": "CVE-2017-6666" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "CNVD", "id": "CNVD-2017-13743" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-114869" }, { "date": "2017-06-07T00:00:00", "db": "BID", "id": "98987" }, { "date": "2017-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004943" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-437" }, { "date": "2024-11-21T03:30:15.650000", "db": "NVD", "id": "CVE-2017-6666" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "98987" }, { "db": "CNNVD", "id": "CNNVD-201706-437" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Network Convergence System 5500 For series router Cisco IOS XR Service disruption in software (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-437" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.