Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-1869

Опубликовано: 20 июн. 2019
Источник: nvd
CVSS3: 8.6
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

A vulnerability in the internal packet-processing functionality of the Cisco StarOS operating system running on virtual platforms could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service interface from receiving any traffic, which would lead to a DoS condition on the affected interface. The device may have to be manually reloaded to recover from exploitation of this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.6 (включая) до 21.6.13 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.6b (включая) до 21.6b.16 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.7 (включая) до 21.7.11 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.8 (включая) до 21.8.10 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.9 (включая) до 21.9.7 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.10 (включая) до 21.10.2 (исключая)
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
Версия от 21.11 (включая) до 21.11.1 (исключая)

Одно из

cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.01061
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-824
CWE-824

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the internal packet-processing functionality of the Cisco StarOS operating system running on virtual platforms could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service interface from receiving any traffic, which would lead to a DoS condition on the affected interface. The device may have to be manually reloaded to recover from exploitation of this vulnerability.

CVSS3: 8.6
fstec
больше 6 лет назад

Уязвимость обработчика пакетов операционной системы Cisco StarOS, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 77%
0.01061
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-824
CWE-824