ID
VAR-E-201509-0256
CVE
cve_id: | CVE-2015-6279 | Trust: 0.3 |
cve_id: | CVE-2015-6278 | Trust: 0.3 |
TITLE
Cisco IOS and IOS XE Software IPv6 Snooping Multiple Denial of Service Vulnerabilities
Trust: 0.3
DESCRIPTION
Cisco IOS and IOS XE Software are prone to multiple remote denial-of-service vulnerabilities.
An attacker can exploit these issues to cause an affected device to reload, denying service to legitimate users.
These issues are being tracked by Cisco Bug IDs CSCuo04400, and CSCus19794.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 15.4 s2 | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 15.2 e | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 15.4 s1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.2 e1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.2 e2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.1 sy5 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.1 sy3 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.1 sy2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 15.1 sy1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios xe software 3.9s.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.9s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.9s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.7e.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.7e.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e.2a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.6e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.5e.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.5e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.4sg.6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.4sg.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.4sg.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.4sg.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.3xo.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.3xo.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.3xo.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.3se.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.3se.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.2se.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.2se.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.2se.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.2se.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.14s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.14s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.13s.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.13s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.13s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.12s.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.12s.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.12s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.12s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.11s.4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.11s.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.11s.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.11s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.11s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe software 3.10s.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.5s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.5 s1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.4s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.4 s3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3sa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3 sa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3 s5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3 s1a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.3 s1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2e | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s4a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s3a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 sy0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 e3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1 sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0ez | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0ej | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 ex5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 ez | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 ej1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 sy8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 sy7a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 sy6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 sy4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 sy1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 ex | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sy4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sy3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sy2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.0 sy18 | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
To exploit these issues attackers can use readily available utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2015-6279 | Trust: 0.3 |
db: | NVD | id: | CVE-2015-6278 | Trust: 0.3 |
db: | BID | id: | 76829 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/public/sw-center/sw-ios.shtml | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/viewalert.x?alertid=40940 | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/viewalert.x?alertid=40941 | Trust: 0.3 |
url: | http://www.cisco.com/ | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150923-fhs | Trust: 0.3 |
SOURCES
db: | BID | id: | 76829 |
LAST UPDATE DATE
2022-07-27T09:18:39.354000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 76829 | date: | 2015-09-23T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 76829 | date: | 2015-09-23T00:00:00 |