CVE-2013-1167
Published Apr 11, 2013
Last updated 3 years ago
Overview
- Description
- Cisco IOS XE 3.2 through 3.4 before 3.4.2S, and 3.5, on 1000 series Aggregation Services Routers (ASR), when bridge domain interface (BDI) is enabled, allows remote attackers to cause a denial of service (card reload) via packets that are not properly handled during the processing of encapsulation, aka Bug ID CSCtt11558.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7F018C7-4BC5-443E-815E-481C805F3612" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "621845E0-E885-46E4-929D-55DBE43DC97F" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6256C79-DBDA-4ED7-AA3B-DE78B8C387B3" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "429F3E17-5C65-4C91-8881-AAEAA00BCD44" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F47E76FF-DE36-463D-B610-A99C90AF7B91" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "737D7668-872C-4246-9AB9-12FF059E231A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41E237F6-97DA-45AE-8505-B3F629AB026D" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45225F2-C9EB-493D-B845-64BFB8DBB89B" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252377A3-7F15-45F2-A169-BBC37858D4DA" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02E8F96A-EA9C-4E66-8491-9B2A3A4023F5" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86947E54-A1B9-4ECE-92A6-417462249612" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C910BE7C-517F-4E41-8433-1858F700AA22" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A862D914-CE60-48A9-9D52-299642BE3FF6" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E" }, { "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F" }, { "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F" }, { "criteria": "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EAE214D-8DD8-4DA3-872A-609E7CE6E606" }, { "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B" }, { "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D" }, { "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302" }, { "criteria": "cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "399C03D1-C4B2-4DE6-9772-EC0BD88D7FCF" } ], "operator": "OR" } ], "operator": "AND" } ]