var-201608-0244
Vulnerability from variot
Cisco IOS 15.5(3)S3, 15.6(1)S2, 15.6(2)S1, and 15.6(2)T1 does not properly dequeue invalid NTP packets, which allows remote attackers to cause a denial of service (interface wedge) by sending many crafted NTP packets, aka Bug ID CSCva35619. Cisco IOS is an operating system developed by Cisco Systems for its network devices. Cisco IOS Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCva35619
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.5\\(3\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.6\\(1\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.6\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.6\\(2\\)s1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.5(3)s3" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.6(1)s2" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.6(2)s1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.6(2)t1" }, { "model": "ios xe", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.16.3s" }, { "model": "ios xe", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.17.2s" }, { "model": "ios xe", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.18.1s" }, { "model": "ios software 15.5 s3", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios software 15.6 s2", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios software 15.6 s1", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios software 15.6 t1", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios xe 3.18.1s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios xe 3.17.2s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios xe 3.16.3s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.6 t1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.6 s1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.6 s2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.5 s3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios xe 3.18.0sp", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.6 m", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 15.6 sp", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "BID", "id": "92317" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ios_xe", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004313" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "92317" } ], "trust": 0.3 }, "cve": "CVE-2016-1478", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-1478", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-06186", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90297", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-1478", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1478", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1478", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-06186", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201608-180", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90297", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "VULHUB", "id": "VHN-90297" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS 15.5(3)S3, 15.6(1)S2, 15.6(2)S1, and 15.6(2)T1 does not properly dequeue invalid NTP packets, which allows remote attackers to cause a denial of service (interface wedge) by sending many crafted NTP packets, aka Bug ID CSCva35619. Cisco IOS is an operating system developed by Cisco Systems for its network devices. Cisco IOS Software is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug ID CSCva35619", "sources": [ { "db": "NVD", "id": "CVE-2016-1478" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "BID", "id": "92317" }, { "db": "VULHUB", "id": "VHN-90297" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1478", "trust": 3.4 }, { "db": "BID", "id": "92317", "trust": 2.0 }, { "db": "SECTRACK", "id": "1036541", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-004313", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-180", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-06186", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90297", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "VULHUB", "id": "VHN-90297" }, { "db": "BID", "id": "92317" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "id": "VAR-201608-0244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "VULHUB", "id": "VHN-90297" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" } ] }, "last_update_date": "2024-11-23T22:34:48.983000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160804-wedge", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge" }, { "title": "Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2016-06186)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/80250" }, { "title": "Cisco IOS Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63571" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90297" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160804-wedge" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/92317" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036541" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1478" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1478" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "VULHUB", "id": "VHN-90297" }, { "db": "BID", "id": "92317" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-06186" }, { "db": "VULHUB", "id": "VHN-90297" }, { "db": "BID", "id": "92317" }, { "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "db": "CNNVD", "id": "CNNVD-201608-180" }, { "db": "NVD", "id": "CVE-2016-1478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-06186" }, { "date": "2016-08-08T00:00:00", "db": "VULHUB", "id": "VHN-90297" }, { "date": "2016-08-04T00:00:00", "db": "BID", "id": "92317" }, { "date": "2016-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "date": "2016-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-180" }, { "date": "2016-08-08T00:59:09.203000", "db": "NVD", "id": "CVE-2016-1478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-06186" }, { "date": "2017-08-16T00:00:00", "db": "VULHUB", "id": "VHN-90297" }, { "date": "2016-08-10T09:00:00", "db": "BID", "id": "92317" }, { "date": "2016-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004313" }, { "date": "2016-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-180" }, { "date": "2024-11-21T02:46:31", "db": "NVD", "id": "CVE-2016-1478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-180" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-180" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…