Lucene search

K
cveCiscoCVE-2013-6982
HistoryJan 08, 2014 - 9:55 p.m.

CVE-2013-6982

2014-01-0821:55:06
CWE-20
cisco
web.nvd.nist.gov
30
cisco
nx-os
bgp
cve-2013-6982
denial of service
vulnerability
security advisory

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.7

Confidence

High

EPSS

0.012

Percentile

85.0%

The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

Affected configurations

Nvd
Node
cisconx-osRange6.2\(2a\)
OR
cisconx-osMatch-
OR
cisconx-osMatch4.0
OR
cisconx-osMatch4.0\(0\)n1\(1a\)
OR
cisconx-osMatch4.0\(0\)n1\(2\)
OR
cisconx-osMatch4.0\(0\)n1\(2a\)
OR
cisconx-osMatch4.0\(1a\)n1\(1\)
OR
cisconx-osMatch4.0\(1a\)n1\(1a\)
OR
cisconx-osMatch4.0\(1a\)n2\(1\)
OR
cisconx-osMatch4.0\(1a\)n2\(1a\)
OR
cisconx-osMatch4.0\(4\)sv1\(1\)
OR
cisconx-osMatch4.0\(4\)sv1\(2\)
OR
cisconx-osMatch4.0\(4\)sv1\(3\)
OR
cisconx-osMatch4.0\(4\)sv1\(3a\)
OR
cisconx-osMatch4.0\(4\)sv1\(3b\)
OR
cisconx-osMatch4.0\(4\)sv1\(3c\)
OR
cisconx-osMatch4.0\(4\)sv1\(3d\)
OR
cisconx-osMatch4.1\(3\)n1\(1\)
OR
cisconx-osMatch4.1\(3\)n1\(1a\)
OR
cisconx-osMatch4.1\(3\)n2\(1\)
OR
cisconx-osMatch4.1\(3\)n2\(1a\)
OR
cisconx-osMatch4.1.\(2\)
OR
cisconx-osMatch4.1.\(3\)
OR
cisconx-osMatch4.1.\(4\)
OR
cisconx-osMatch4.1.\(5\)
OR
cisconx-osMatch4.2
OR
cisconx-osMatch4.2\(1\)
OR
cisconx-osMatch4.2\(1\)n1\(1\)
OR
cisconx-osMatch4.2\(1\)n2\(1\)
OR
cisconx-osMatch4.2\(1\)n2\(1a\)
OR
cisconx-osMatch4.2\(1\)sv1\(4\)
OR
cisconx-osMatch4.2\(1\)sv1\(4a\)
OR
cisconx-osMatch4.2\(1\)sv1\(5.1\)
OR
cisconx-osMatch4.2\(2\)
OR
cisconx-osMatch4.2\(3\)
OR
cisconx-osMatch4.2\(4\)
OR
cisconx-osMatch4.2\(6\)
OR
cisconx-osMatch4.2\(8\)
OR
cisconx-osMatch4.2.\(2a\)
OR
cisconx-osMatch5.0
OR
cisconx-osMatch5.0\(2\)
OR
cisconx-osMatch5.0\(2\)n1\(1\)
OR
cisconx-osMatch5.0\(2\)n2\(1\)
OR
cisconx-osMatch5.0\(2\)n2\(1a\)
OR
cisconx-osMatch5.0\(2a\)
OR
cisconx-osMatch5.0\(3\)
OR
cisconx-osMatch5.0\(3\)n1\(1\)
OR
cisconx-osMatch5.0\(3\)n1\(1a\)
OR
cisconx-osMatch5.0\(3\)n1\(1b\)
OR
cisconx-osMatch5.0\(3\)n1\(1c\)
OR
cisconx-osMatch5.0\(3\)n2\(1\)
OR
cisconx-osMatch5.0\(3\)n2\(2\)
OR
cisconx-osMatch5.0\(3\)n2\(2a\)
OR
cisconx-osMatch5.0\(3\)n2\(2b\)
OR
cisconx-osMatch5.0\(3\)u1\(1a\)
OR
cisconx-osMatch5.0\(3\)u1\(1b\)
OR
cisconx-osMatch5.0\(3\)u1\(1d\)
OR
cisconx-osMatch5.0\(3\)u1\(2\)
OR
cisconx-osMatch5.0\(3\)u1\(2a\)
OR
cisconx-osMatch5.0\(3\)u2\(1\)
OR
cisconx-osMatch5.0\(3\)u2\(2\)
OR
cisconx-osMatch5.0\(3\)u2\(2a\)
OR
cisconx-osMatch5.0\(3\)u2\(2b\)
OR
cisconx-osMatch5.0\(3\)u2\(2c\)
OR
cisconx-osMatch5.0\(3\)u2\(2d\)
OR
cisconx-osMatch5.0\(3\)u3\(1\)
OR
cisconx-osMatch5.0\(3\)u3\(2\)
OR
cisconx-osMatch5.0\(3\)u3\(2a\)
OR
cisconx-osMatch5.0\(3\)u3\(2b\)
OR
cisconx-osMatch5.0\(3\)u4\(1\)
OR
cisconx-osMatch5.0\(3\)u5\(1\)
OR
cisconx-osMatch5.0\(3\)u5\(1a\)
OR
cisconx-osMatch5.0\(3\)u5\(1b\)
OR
cisconx-osMatch5.0\(3\)u5\(1c\)
OR
cisconx-osMatch5.0\(3\)u5\(1d\)
OR
cisconx-osMatch5.0\(3\)u5\(1e\)
OR
cisconx-osMatch5.0\(5\)
OR
cisconx-osMatch5.1
OR
cisconx-osMatch5.1\(1\)
OR
cisconx-osMatch5.1\(1a\)
OR
cisconx-osMatch5.1\(2\)
OR
cisconx-osMatch5.1\(3\)
OR
cisconx-osMatch5.1\(3\)n1\(1\)
OR
cisconx-osMatch5.1\(3\)n1\(1a\)
OR
cisconx-osMatch5.1\(4\)
OR
cisconx-osMatch5.1\(5\)
OR
cisconx-osMatch5.1\(6\)
OR
cisconx-osMatch5.2
OR
cisconx-osMatch5.2\(1\)
OR
cisconx-osMatch5.2\(3\)
OR
cisconx-osMatch5.2\(3a\)
OR
cisconx-osMatch5.2\(4\)
OR
cisconx-osMatch5.2\(5\)
OR
cisconx-osMatch5.2\(7\)
OR
cisconx-osMatch5.2\(9\)
OR
cisconx-osMatch6.0\(1\)
OR
cisconx-osMatch6.0\(2\)
OR
cisconx-osMatch6.1
OR
cisconx-osMatch6.1\(1\)
OR
cisconx-osMatch6.1\(2\)
OR
cisconx-osMatch6.1\(3\)
VendorProductVersionCPE
cisconx-os*cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
cisconx-os-cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
cisconx-os4.0cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*
cisconx-os4.0(0)n1(1a)cpe:2.3:o:cisco:nx-os:4.0\(0\)n1\(1a\):*:*:*:*:*:*:*
cisconx-os4.0(0)n1(2)cpe:2.3:o:cisco:nx-os:4.0\(0\)n1\(2\):*:*:*:*:*:*:*
cisconx-os4.0(0)n1(2a)cpe:2.3:o:cisco:nx-os:4.0\(0\)n1\(2a\):*:*:*:*:*:*:*
cisconx-os4.0(1a)n1(1)cpe:2.3:o:cisco:nx-os:4.0\(1a\)n1\(1\):*:*:*:*:*:*:*
cisconx-os4.0(1a)n1(1a)cpe:2.3:o:cisco:nx-os:4.0\(1a\)n1\(1a\):*:*:*:*:*:*:*
cisconx-os4.0(1a)n2(1)cpe:2.3:o:cisco:nx-os:4.0\(1a\)n2\(1\):*:*:*:*:*:*:*
cisconx-os4.0(1a)n2(1a)cpe:2.3:o:cisco:nx-os:4.0\(1a\)n2\(1a\):*:*:*:*:*:*:*
Rows per page:
1-10 of 1011

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.7

Confidence

High

EPSS

0.012

Percentile

85.0%

Related for CVE-2013-6982