5
CVSSv2

CVE-2013-1112

Published: 31/01/2013 Updated: 02/02/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Cisco Carrier Routing System (CRS) allows remote malicious users to cause a denial of service (packet loss) via short malformed packets that trigger inefficient processing, aka Bug ID CSCud79136.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco carrier routing system 3.2.4

cisco carrier routing system 3.2.6

cisco carrier routing system 3.3.5

cisco carrier routing system 3.4.2

cisco carrier routing system 3.6.0

cisco carrier routing system 3.6.3

cisco carrier routing system 3.6.2

cisco carrier routing system 3.7.0

cisco carrier routing system 3.7.1

cisco carrier routing system 3.9.3

cisco carrier routing system 3.3.0

cisco carrier routing system 4.0.4

cisco carrier routing system 3.4.1

cisco carrier routing system 3.3.2

cisco carrier routing system 3.5.2

cisco carrier routing system 3.4.3

cisco carrier routing system 3.8.4

cisco carrier routing system 3.9.0

cisco carrier routing system 4.0.0

cisco carrier routing system 4.0.1

cisco carrier routing system 4.1.0

cisco carrier routing system 4.1.1

cisco carrier routing system 3.3.1

cisco carrier routing system 3.3.4

cisco carrier routing system 3.5.4

cisco carrier routing system 3.5.3

cisco carrier routing system 3.8.2

cisco carrier routing system 3.8.3

cisco carrier routing system 4.0.3

cisco carrier routing system 3.2.3

cisco carrier routing system 4.1.2

cisco carrier routing system 3.4.0

cisco carrier routing system 3.3.3

cisco carrier routing system 3.6.1

cisco carrier routing system 3.8.0

cisco carrier routing system 3.8.1

cisco carrier routing system 3.9.1

cisco carrier routing system 3.9.2

Vendor Advisories

Cisco Carrier Routing System (CRS) contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system The vulnerability is due to the improper handling of malformed packets processed by the affected software An unauthenticated, remote attacker could exploit the vulnera ...