CVE-2012-2488
Published May 31, 2012
Last updated 12 years ago
Overview
- Description
- Cisco IOS XR before 4.2.1 on ASR 9000 series devices and CRS series devices allows remote attackers to cause a denial of service (packet transmission outage) via a crafted packet, aka Bug IDs CSCty94537 and CSCtz62593.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Evaluator
- Comment
- -
- Impact
- Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr 'Affected Products This vulnerability affects IOS XR Software version 4.2.0 running on the Cisco ASR 9000 Series RSP440. It also affects IOS XR Software versions 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 running on the CRS Performance Route Processor.'
- Solution
- Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr 'Affected Products This vulnerability affects IOS XR Software version 4.2.0 running on the Cisco ASR 9000 Series RSP440. It also affects IOS XR Software versions 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 running on the CRS Performance Route Processor.'
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0C513C0-97CB-4F5A-9942-5AF48742BDA9", "versionEndIncluding": "4.2.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_9000_rsp440_router:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A580194-1B06-4D71-B618-345046DBA9C6" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F8B336-0DFA-41CE-9EFF-89A09BBDC6D6" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A1D1B60-C94F-44BF-8194-7758394E31C3" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06E63681-C89F-4569-A52C-B870D48E436C" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E593EF3-133A-4E15-9B86-6B451F5C0159" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BB49EB2-2D99-4C45-80B7-48299A1EBF30" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB6ABB63-E2D2-42F7-B648-BF6002D1C05E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:crs_performance_route_processor:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6D383DA-04D7-4789-B7F7-B31FD645BA8F" } ], "operator": "OR" } ], "operator": "AND" } ]