ID

VAR-E-201509-0256


CVE

cve_id:CVE-2015-6279

Trust: 0.3

cve_id:CVE-2015-6278

Trust: 0.3

sources: BID: 76829

TITLE

Cisco IOS and IOS XE Software IPv6 Snooping Multiple Denial of Service Vulnerabilities

Trust: 0.3

sources: BID: 76829

DESCRIPTION

Cisco IOS and IOS XE Software are prone to multiple remote denial-of-service vulnerabilities.
An attacker can exploit these issues to cause an affected device to reload, denying service to legitimate users.
These issues are being tracked by Cisco Bug IDs CSCuo04400, and CSCus19794.

Trust: 0.3

sources: BID: 76829

AFFECTED PRODUCTS

vendor:ciscomodel:ios 15.4 s2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 escope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.4 s1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 e1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 e2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 sy5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 sy3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 sy2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 sy1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe software 3.9s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7e.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7e.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6e.2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6e.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6e.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6e.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6e.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5e.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3xo.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3xo.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3xo.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3se.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3se.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.14s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.13s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.12s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.11s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.5sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.5 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s4ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 sy0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 e3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0ejscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ex5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ej1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy7ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sy4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sy3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sy2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sy18scope: - version: -

Trust: 0.3

sources: BID: 76829

EXPLOIT

To exploit these issues attackers can use readily available utilities.

Trust: 0.3

sources: BID: 76829

PRICE

Free

Trust: 0.3

sources: BID: 76829

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 76829

CREDITS

Cisco

Trust: 0.3

sources: BID: 76829

EXTERNAL IDS

db:NVDid:CVE-2015-6279

Trust: 0.3

db:NVDid:CVE-2015-6278

Trust: 0.3

db:BIDid:76829

Trust: 0.3

sources: BID: 76829

REFERENCES

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40940

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40941

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150923-fhs

Trust: 0.3

sources: BID: 76829

SOURCES

db:BIDid:76829

LAST UPDATE DATE

2022-07-27T09:18:39.354000+00:00


SOURCES UPDATE DATE

db:BIDid:76829date:2015-09-23T00:00:00

SOURCES RELEASE DATE

db:BIDid:76829date:2015-09-23T00:00:00