var-201309-0454
Vulnerability from variot
Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS), Cisco Security Manager, Cisco Unified Service Monitor, and Cisco Unified Operations Manager, does not properly interact with the ActiveMQ component, which allows remote attackers to cause a denial of service (memory consumption) via simultaneous TCP sessions, aka Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969. Vendors have confirmed this vulnerability Bug ID CSCuh54766 , CSCuh01267 , CSCuh95976 ,and CSCuh95969 It is released as.Executed simultaneously by a third party TCP Service disruption through session ( Memory consumption ) There is a possibility of being put into a state. Multiple Cisco products is prone to a denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to consume memory resources, resulting in a denial-of-service condition This issue is being tracked by Cisco Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969. ActiveMQ is one of the open source message middleware components, which supports Java message service, cluster, Spring Framework, etc. An attacker could exploit this vulnerability by opening multiple concurrent TCP sessions to exhaust available memory, causing a denial of service (process hang or crash)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0454", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "prime lan management solution", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "unified service monitor", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "unified operations manager", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "security manager", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "security manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "prime lan management solution", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "unified operations manager", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "unified service monitor", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0.1" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "unified service monitor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0.3" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0.2" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0.1" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "unified operations manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "unified operations manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "security manager sp2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "security manager sp4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security manager sp3", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security manager sp2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security manager sp4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.2" }, { "model": "security manager sp3", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.2" }, { "model": "security manager sp2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.2" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.2" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.2" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.2" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "security manager sp2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "security manager sp1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" } ], "sources": [ { "db": "BID", "id": "62333" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "CNNVD", "id": "CNNVD-201309-165" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:prime_lan_management_solution", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:security_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:unified_operations_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:unified_service_monitor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004095" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "62333" } ], "trust": 0.3 }, "cve": "CVE-2013-5488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-5488", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-65490", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5488", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-5488", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201309-165", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65490", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65490" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "CNNVD", "id": "CNNVD-201309-165" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS), Cisco Security Manager, Cisco Unified Service Monitor, and Cisco Unified Operations Manager, does not properly interact with the ActiveMQ component, which allows remote attackers to cause a denial of service (memory consumption) via simultaneous TCP sessions, aka Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969. Vendors have confirmed this vulnerability Bug ID CSCuh54766 , CSCuh01267 , CSCuh95976 ,and CSCuh95969 It is released as.Executed simultaneously by a third party TCP Service disruption through session ( Memory consumption ) There is a possibility of being put into a state. Multiple Cisco products is prone to a denial-of-service vulnerability. \nSuccessfully exploiting this issue allows remote attackers to consume memory resources, resulting in a denial-of-service condition\nThis issue is being tracked by Cisco Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969. ActiveMQ is one of the open source message middleware components, which supports Java message service, cluster, Spring Framework, etc. An attacker could exploit this vulnerability by opening multiple concurrent TCP sessions to exhaust available memory, causing a denial of service (process hang or crash)", "sources": [ { "db": "NVD", "id": "CVE-2013-5488" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "BID", "id": "62333" }, { "db": "VULHUB", "id": "VHN-65490" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5488", "trust": 2.8 }, { "db": "BID", "id": "62333", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2013-004095", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201309-165", "trust": 0.7 }, { "db": "CISCO", "id": "20130911 COMMON SERVICES ACTIVEMQ DENIAL OF SERVICE VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-65490", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65490" }, { "db": "BID", "id": "62333" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "CNNVD", "id": "CNNVD-201309-165" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "id": "VAR-201309-0454", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65490" } ], "trust": 0.7875 }, "last_update_date": "2024-11-23T23:05:52.895000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Common Services ActiveMQ Denial of Service Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5488" }, { "title": "30749", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30749" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004095" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65490" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5488" }, { "trust": 1.4, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30749" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/62333" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87026" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5488" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5488" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/prod/collateral/vpndevc/ps5739/ps6498/data_sheet_c78-458677-00_ps6498_products_data_sheet.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65490" }, { "db": "BID", "id": "62333" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "CNNVD", "id": "CNNVD-201309-165" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65490" }, { "db": "BID", "id": "62333" }, { "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "db": "CNNVD", "id": "CNNVD-201309-165" }, { "db": "NVD", "id": "CVE-2013-5488" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-12T00:00:00", "db": "VULHUB", "id": "VHN-65490" }, { "date": "2013-09-11T00:00:00", "db": "BID", "id": "62333" }, { "date": "2013-09-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "date": "2013-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-165" }, { "date": "2013-09-12T13:28:32.207000", "db": "NVD", "id": "CVE-2013-5488" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-65490" }, { "date": "2015-03-19T09:34:00", "db": "BID", "id": "62333" }, { "date": "2013-09-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004095" }, { "date": "2013-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-165" }, { "date": "2024-11-21T01:57:34.377000", "db": "NVD", "id": "CVE-2013-5488" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-165" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Used in products Cisco Common Services Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004095" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-165" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.