Lucene search

K
cve[email protected]CVE-2015-0681
HistoryJul 24, 2015 - 4:59 p.m.

CVE-2015-0681

2015-07-2416:59:00
CWE-399
web.nvd.nist.gov
34
cisco
ios
ios xe
tftp server
denial of service
memory management
cve-2015-0681
nvd

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.7 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%

The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733.

Affected configurations

NVD
Node
ciscoiosMatch12.2\(33\)xn1
OR
ciscoiosMatch12.2\(44\)sq1
OR
ciscoiosMatch12.4\(23\)jy
OR
ciscoiosMatch12.4\(25e\)jam1
OR
ciscoiosMatch12.4\(25e\)jao5m
OR
ciscoiosMatch15.0\(2\)ed1
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.1\(3\)svf4a
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoios_xeMatch2.5.0
OR
ciscoios_xeMatch2.5.1
OR
ciscoios_xeMatch2.5.2
OR
ciscoios_xeMatch2.6.0
OR
ciscoios_xeMatch2.6.1
OR
ciscoios_xeMatch2.6.2
OR
ciscoios_xeMatch3.1s.0
OR
ciscoios_xeMatch3.1s.1
OR
ciscoios_xeMatch3.1s.2
OR
ciscoios_xeMatch3.1s.3
OR
ciscoios_xeMatch3.1s.4
OR
ciscoios_xeMatch3.1s.5
OR
ciscoios_xeMatch3.1s.6
OR
ciscoios_xeMatch3.1sg.0
OR
ciscoios_xeMatch3.1sg.1
OR
ciscoios_xeMatch3.2s.0
OR
ciscoios_xeMatch3.2s.1
OR
ciscoios_xeMatch3.2s.2
OR
ciscoios_xeMatch3.2s.3
OR
ciscoios_xeMatch3.2se.0
OR
ciscoios_xeMatch3.2se.1
OR
ciscoios_xeMatch3.2se.2
OR
ciscoios_xeMatch3.2se.3
OR
ciscoios_xeMatch3.2sg.0
OR
ciscoios_xeMatch3.2sg.1
OR
ciscoios_xeMatch3.2sg.2
OR
ciscoios_xeMatch3.2sg.3
OR
ciscoios_xeMatch3.2sg.4
OR
ciscoios_xeMatch3.2sg.5
OR
ciscoios_xeMatch3.2sg.6
OR
ciscoios_xeMatch3.2sg.7
OR
ciscoios_xeMatch3.2sg.8
OR
ciscoios_xeMatch3.2sg.9
OR
ciscoios_xeMatch3.2xo.0
OR
ciscoios_xeMatch3.2xo.1
OR
ciscoios_xeMatch3.3sg.0
OR
ciscoios_xeMatch3.3sg.1
OR
ciscoios_xeMatch3.3sg.2
OR
ciscoios_xeMatch3.3sq.0
OR
ciscoios_xeMatch3.3sq.1
OR
ciscoios_xeMatch3.4s.0
OR
ciscoios_xeMatch3.4s.1
OR
ciscoios_xeMatch3.4s.2
OR
ciscoios_xeMatch3.4s.3
OR
ciscoios_xeMatch3.4s.4
OR
ciscoios_xeMatch3.4s.5
OR
ciscoios_xeMatch3.4s.6
OR
ciscoios_xeMatch3.4sq.0
OR
ciscoios_xeMatch3.4sq.1
OR
ciscoios_xeMatch3.5s.0
OR
ciscoios_xeMatch3.5s.1
OR
ciscoios_xeMatch3.5s.2
OR
ciscoios_xeMatch3.5s_base

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.7 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%