ID

VAR-200112-0001


CVE

CVE-2001-0863


TITLE

Cisco Fragment Keyword Outgoing Access Control Vulnerability

Trust: 0.9

sources: BID: 3539 // CNNVD: CNNVD-200112-073

DESCRIPTION

Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not handle the "fragment" keyword in a compiled ACL (Turbo ACL) for packets that are sent to the router, which allows remote attackers to cause a denial of service via a flood of fragments. IOS is the Cisco Internet Operating System, distributed with and used on various Cisco network hardware. A possible vulnerability in IOS on the 12000 series Cisco routers could make it possible for a remote user to send unauthorized traffic to a protected network. IOS for the Cisco 12000 has only recently added the ability to filter fragmented packets in outgoing traffic. If a 'fragment' rule in an outgoing ACL exists in a version without this feature, attackers may be able to evade it and send fragmented packets to a protect network. This vulnerability may result in attackers or users bypassing security policy

Trust: 1.26

sources: NVD: CVE-2001-0863 // BID: 3539 // VULHUB: VHN-3670

AFFECTED PRODUCTS

vendor:ciscomodel:12000 routerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:12000 routerscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

sources: BID: 3539 // CNNVD: CNNVD-200112-073 // NVD: CVE-2001-0863

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0863
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200112-073
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3670
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0863
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3670
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-3670 // CNNVD: CNNVD-200112-073 // NVD: CVE-2001-0863

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0863

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200112-073

TYPE

Design Error

Trust: 0.9

sources: BID: 3539 // CNNVD: CNNVD-200112-073

EXTERNAL IDS

db:BIDid:3539

Trust: 2.0

db:OSVDBid:1987

Trust: 1.7

db:NVDid:CVE-2001-0863

Trust: 1.7

db:CNNVDid:CNNVD-200112-073

Trust: 0.7

db:CISCOid:20011114 MULTIPLE VULNERABILITIES IN ACCESS CONTROL LIST IMPLEMENTATION FOR CISCO 12000 SERIES INTERNET ROUTER

Trust: 0.6

db:XFid:7551

Trust: 0.6

db:CIACid:M-018

Trust: 0.6

db:VULHUBid:VHN-3670

Trust: 0.1

sources: VULHUB: VHN-3670 // BID: 3539 // CNNVD: CNNVD-200112-073 // NVD: CVE-2001-0863

REFERENCES

url:http://www.securityfocus.com/bid/3539

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/m-018.shtml

Trust: 1.7

url:http://www.cisco.com/warp/public/707/gsr-acl-pub.shtml

Trust: 1.7

url:http://www.osvdb.org/1987

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7551

Trust: 1.1

url:http://xforce.iss.net/static/7551.php

Trust: 0.6

url:http://www.cisco.com/warp/public/707/sec_incident_response.shtml

Trust: 0.3

sources: VULHUB: VHN-3670 // BID: 3539 // CNNVD: CNNVD-200112-073 // NVD: CVE-2001-0863

CREDITS

This vulnerability was first published in a Cisco Security Advisory on November 14th, 2001.

Trust: 0.9

sources: BID: 3539 // CNNVD: CNNVD-200112-073

SOURCES

db:VULHUBid:VHN-3670
db:BIDid:3539
db:CNNVDid:CNNVD-200112-073
db:NVDid:CVE-2001-0863

LAST UPDATE DATE

2025-04-03T22:16:57.137000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-3670date:2017-10-10T00:00:00
db:BIDid:3539date:2001-11-14T00:00:00
db:CNNVDid:CNNVD-200112-073date:2005-10-12T00:00:00
db:NVDid:CVE-2001-0863date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-3670date:2001-12-06T00:00:00
db:BIDid:3539date:2001-11-14T00:00:00
db:CNNVDid:CNNVD-200112-073date:2001-12-06T00:00:00
db:NVDid:CVE-2001-0863date:2001-12-06T05:00:00