The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact Partial
AV:N/AC:M/Au:N/C:P/I:N/A:P
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: certcc
Published: 2013-08-03T01:00:00
Updated: 2024-08-06T14:18:09.198Z
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0149
Vulnrichment
No data.
NVD
Status : Modified
Published: 2013-08-05T13:22:47.847
Modified: 2024-11-21T01:46:56.630
Link: CVE-2013-0149
Redhat