Lucene search

K
ciscoCiscoCISCO-SA-20150325-MDNS
HistoryMar 25, 2015 - 4:00 p.m.

Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service Vulnerability

2015-03-2516:00:00
tools.cisco.com
12

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.0%

A vulnerability in the multicast DNS (mDNS) gateway function of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to reload the vulnerable device.

The vulnerability is due to improper validation of mDNS packets. An attacker could exploit this vulnerability by sending malformed IP version 4 (IPv4) or IP version 6 (IPv6) packets on UDP port 5353. An exploit could allow the attacker to cause a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability. This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns”]wo

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html”]

Affected configurations

Vulners
Node
ciscoiosMatch15.1sy
OR
ciscoiosMatch15.3s
OR
ciscoiosMatch15.4t
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.2jb
OR
ciscoiosMatch15.4s
OR
ciscoiosMatch15.4m
OR
ciscoiosMatch15.4sn
OR
ciscoiosMatch15.3jn
OR
ciscoiosMatch12.4jap
OR
ciscoiosMatch15.3ja
OR
ciscoiosMatch15.3jnb
OR
ciscocisco_iosMatch3.3sexe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.11sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.13sxe
OR
ciscocisco_iosMatch3.6exe
OR
ciscoiosMatch15.1\(2\)sy
OR
ciscoiosMatch15.1\(2\)sy1
OR
ciscoiosMatch15.1\(2\)sy2
OR
ciscoiosMatch15.1\(2\)sy3
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.3\(3\)s2
OR
ciscoiosMatch15.3\(3\)s3
OR
ciscoiosMatch15.3\(3\)s1a
OR
ciscoiosMatch15.3\(3\)s2a
OR
ciscoiosMatch15.4\(1\)t
OR
ciscoiosMatch15.4\(2\)t
OR
ciscoiosMatch15.4\(1\)t2
OR
ciscoiosMatch15.4\(1\)t1
OR
ciscoiosMatch15.4\(2\)t1
OR
ciscoiosMatch15.2\(1\)e
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(1\)e1
OR
ciscoiosMatch15.2\(1\)e2
OR
ciscoiosMatch15.2\(1\)e3
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoiosMatch15.4\(1\)s
OR
ciscoiosMatch15.4\(3\)s
OR
ciscoiosMatch15.4\(1\)s1
OR
ciscoiosMatch15.4\(1\)s2
OR
ciscoiosMatch15.4\(2\)s1
OR
ciscoiosMatch15.4\(3\)m
OR
ciscoiosMatch15.4\(3\)m1
OR
ciscoiosMatch15.4\(3\)m2
OR
ciscoiosMatch15.4\(2\)sn
OR
ciscoiosMatch15.4\(2\)sn1
OR
ciscoiosMatch15.4\(3\)sn1
OR
ciscoiosMatch15.3\(3\)jn
OR
ciscoiosMatch12.4\(25e\)jap1m
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)jnb
OR
ciscocisco_iosMatch3.3.0sexe
OR
ciscocisco_iosMatch3.3.1sexe
OR
ciscocisco_iosMatch3.3.2sexe
OR
ciscocisco_iosMatch3.3.3sexe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.3.1xoxe
OR
ciscocisco_iosMatch3.3.2xoxe
OR
ciscocisco_iosMatch3.5.0exe
OR
ciscocisco_iosMatch3.5.1exe
OR
ciscocisco_iosMatch3.5.2exe
OR
ciscocisco_iosMatch3.5.3exe
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.2sxe
OR
ciscocisco_iosMatch3.10.3sxe
OR
ciscocisco_iosMatch3.10.1xcsxe
OR
ciscocisco_iosMatch3.10.2asxe
OR
ciscocisco_iosMatch3.10.2tsxe
OR
ciscocisco_iosMatch3.10.1xbsxe
OR
ciscocisco_iosMatch3.11.1sxe
OR
ciscocisco_iosMatch3.11.2sxe
OR
ciscocisco_iosMatch3.11.0sxe
OR
ciscocisco_iosMatch3.12.0sxe
OR
ciscocisco_iosMatch3.12.1sxe
OR
ciscocisco_iosMatch3.12.0asxe
OR
ciscocisco_iosMatch3.13.0sxe
OR
ciscocisco_iosMatch3.13.0asxe
OR
ciscocisco_iosMatch3.6.0exe
OR
ciscocisco_iosMatch3.6.0aexe
VendorProductVersionCPE
ciscoios15.1sycpe:2.3:o:cisco:ios:15.1sy:*:*:*:*:*:*:*
ciscoios15.3scpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*
ciscoios15.4tcpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:*
ciscoios15.2ecpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:*
ciscoios15.2jbcpe:2.3:o:cisco:ios:15.2jb:*:*:*:*:*:*:*
ciscoios15.4scpe:2.3:o:cisco:ios:15.4s:*:*:*:*:*:*:*
ciscoios15.4mcpe:2.3:o:cisco:ios:15.4m:*:*:*:*:*:*:*
ciscoios15.4sncpe:2.3:o:cisco:ios:15.4sn:*:*:*:*:*:*:*
ciscoios15.3jncpe:2.3:o:cisco:ios:15.3jn:*:*:*:*:*:*:*
ciscoios12.4japcpe:2.3:o:cisco:ios:12.4jap:*:*:*:*:*:*:*
Rows per page:
1-10 of 861

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.0%