CVE-2013-5552
Published Nov 13, 2013
Last updated 11 years ago
Overview
- Description
- Cisco IOS 12.4(24)MDB9 and earlier on Content Services Gateway (CSG) devices does not properly implement the "parse error drop" feature, which allows remote attackers to bypass intended access restrictions via a crafted series of packets, aka Bug ID CSCug90143.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Evaluator
- Comment
- Additional versions CISCO IOS are vulnerable per http://tools.cisco.com/security/center/viewAlert.x?alertId=31715
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "820D1B94-7EF3-4032-BF99-28BE17326A1E", "versionEndIncluding": "12.4\\(24\\)mdb14" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "539454C8-EA90-4146-9429-72465CF555FE" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E44F5F4-D7FE-4B9C-BA65-2365EF7A8092" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9548BCBF-0E01-41F8-A6BA-D70032340C73" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9BF1BB8-EAB1-46C9-BD36-73E502619C88" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34F23388-1B0B-4708-85F4-5A8B7359C1B2" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6728EA8-00AC-4BE1-AA48-22D8AA861532" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C647005-D8AF-4344-8493-4440FDF9E5D5" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10090F0A-645B-451E-ABAA-57DCA9C081E5" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B87BBFE8-2D55-4CDF-B624-6B509411945B" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81D33091-2FD1-41BB-98F7-600AB58090AA" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41D3C059-9E65-40B4-9353-F0A089AEDB03" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF65A6E8-8D58-4537-8AE6-DE4A72FF3A58" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9622A8CF-0C0A-4CED-B469-CAA868970323" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9746F30-F1AD-4643-8BAD-6FD049B7536F" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C533F5D8-9C23-4D7E-8C58-56B65AD76AEA" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB531CBC-8EE0-46B0-88C5-2362837729E6" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4485F3-AF11-4E2D-AF01-8243D9C8A851" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4433412-E849-4040-BAA5-1CE9CE17B924" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E9B1DF0-A3D9-4AFD-9305-C156A8CB101C" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9C02086-1473-403B-97AF-8500104E6C96" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED2ED2BA-9D3E-412B-86C2-2A0E9588E84D" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AC9CBDA-AFED-45E7-91CC-8AFD887122D3" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCA93FA2-0C10-4809-8EE3-3445DC5B1E05" }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mda12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20C7EDD2-EA4E-411A-BABD-E466BF997E3B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_services_gateway:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6B8568B-1AC1-4106-8EBC-473B2E9E91D0" } ], "operator": "OR" } ], "operator": "AND" } ]