ID
VAR-E-201203-0958
CVE
cve_id: | CVE-2012-1311 | Trust: 0.3 |
TITLE
Cisco IOS RSVP Feature Remote Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a remote denial-of-service vulnerability.
Successful exploits will result in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCts80643.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.4 | Trust: 0.6 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.4.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe t | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.6.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.5.0s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.3.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.3.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.2.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.2.0sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.1xsg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.1.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1snh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1sng | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1ey | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0xo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0sa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0mra | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.4.2s | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 m4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 m3a | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 m3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 t3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 s2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 gc2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 ey2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 t5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m8 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2012-1311 | Trust: 0.3 |
db: | BID | id: | 52754 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/ | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120328-rsvp#affected | Trust: 0.3 |
url: | http://www.cisco.com/public/sw-center/sw-ios.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 52754 |
LAST UPDATE DATE
2022-07-27T09:19:07.961000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 52754 | date: | 2012-03-28T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 52754 | date: | 2012-03-28T00:00:00 |