Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-3358 | First vendor Publication | 2014-09-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Memory leak in Cisco IOS 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.3.xSE before 3.3.2SE, 3.3.xXO before 3.3.1XO, 3.5.xE before 3.5.2E, and 3.11.xS before 3.11.1S allows remote attackers to cause a denial of service (memory consumption, and interface queue wedge or device reload) via malformed mDNS packets, aka Bug ID CSCuj58950. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3358 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 4 | |
Os | 6 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-27 | Cisco IOS mDNS denial of service attempt RuleID : 33929 - Revision : 2 - Type : SERVER-OTHER |
2015-03-27 | Cisco IOS mDNS denial of service attempt RuleID : 33928 - Revision : 2 - Type : SERVER-OTHER |
2014-11-16 | Cisco IOS mDNS malformed rrlength denial of service attempt RuleID : 31984 - Revision : 2 - Type : OS-OTHER |
2014-11-16 | Cisco IOS mdns memory leak RuleID : 31982 - Revision : 1 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-02 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20140924-mdns-iosxe.nasl - Type : ACT_GATHER_INFO |
2014-10-02 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20140924-mdns.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:40:47 |
|
2021-05-04 12:32:10 |
|
2021-04-22 01:38:45 |
|
2020-05-23 00:40:59 |
|
2017-08-29 09:24:34 |
|
2017-01-07 09:25:34 |
|
2014-11-16 21:25:03 |
|
2014-10-03 13:27:18 |
|
2014-09-25 21:24:44 |
|
2014-09-25 17:24:07 |
|