ID

VAR-200206-0039


CVE

CVE-2002-0339


TITLE

Cisco IOS discloses fragments of previous packets when Express Forwarding is enabled

Trust: 0.8

sources: CERT/CC: VU#310387

DESCRIPTION

Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length. A vulnerability exists in multiple versions of Cisco's Internetworking Operating System (IOS) software that allows an attacker to collect fragments of previously processed packets. IOS is the Internet Operating System, used on Cisco routers. It is distributed and maintained by Cisco. Under some circumstances, Cisco IOS may leak information from previously routed packets that are still in memory. The data used to pad the packet is taken from other packets previously routed that are still in the router's memory. It should be noted that this problem occurs only when Cisco Express Forwarding is enabled. Attackers cannot specify the content of the information to be obtained, which reduces the possibility of obtaining sensitive information

Trust: 1.98

sources: NVD: CVE-2002-0339 // CERT/CC: VU#310387 // BID: 4191 // VULHUB: VHN-4732

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.0st

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:11.1cc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1e

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ccscope: - version: -

Trust: 0.3

sources: CERT/CC: VU#310387 // BID: 4191 // CNNVD: CNNVD-200206-066 // NVD: CVE-2002-0339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0339
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#310387
value: 3.94

Trust: 0.8

CNNVD: CNNVD-200206-066
value: MEDIUM

Trust: 0.6

VULHUB: VHN-4732
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0339
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4732
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#310387 // VULHUB: VHN-4732 // CNNVD: CNNVD-200206-066 // NVD: CVE-2002-0339

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0339

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200206-066

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200206-066

EXTERNAL IDS

db:BIDid:4191

Trust: 2.8

db:CERT/CCid:VU#310387

Trust: 2.5

db:NVDid:CVE-2002-0339

Trust: 1.7

db:OSVDBid:806

Trust: 1.7

db:CNNVDid:CNNVD-200206-066

Trust: 0.7

db:CISCOid:20020227 CISCO SECURITY ADVISORY: DATA LEAK WITH CISCO EXPRESS FORWARDING

Trust: 0.6

db:XFid:8296

Trust: 0.6

db:VULHUBid:VHN-4732

Trust: 0.1

sources: CERT/CC: VU#310387 // VULHUB: VHN-4732 // BID: 4191 // CNNVD: CNNVD-200206-066 // NVD: CVE-2002-0339

REFERENCES

url:http://www.cisco.com/warp/public/707/ios-cef-pub.shtml

Trust: 2.5

url:http://www.securityfocus.com/bid/4191

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/310387

Trust: 1.7

url:http://www.osvdb.org/806

Trust: 1.7

url:http://www.iss.net/security_center/static/8296.php

Trust: 1.7

sources: CERT/CC: VU#310387 // VULHUB: VHN-4732 // CNNVD: CNNVD-200206-066 // NVD: CVE-2002-0339

CREDITS

Cisco Security Advisory

Trust: 0.6

sources: CNNVD: CNNVD-200206-066

SOURCES

db:CERT/CCid:VU#310387
db:VULHUBid:VHN-4732
db:BIDid:4191
db:CNNVDid:CNNVD-200206-066
db:NVDid:CVE-2002-0339

LAST UPDATE DATE

2025-04-03T22:39:09.932000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#310387date:2002-03-05T00:00:00
db:VULHUBid:VHN-4732date:2008-09-05T00:00:00
db:BIDid:4191date:2002-02-27T00:00:00
db:CNNVDid:CNNVD-200206-066date:2005-05-02T00:00:00
db:NVDid:CVE-2002-0339date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#310387date:2002-03-04T00:00:00
db:VULHUBid:VHN-4732date:2002-06-25T00:00:00
db:BIDid:4191date:2002-02-27T00:00:00
db:CNNVDid:CNNVD-200206-066date:2002-02-27T00:00:00
db:NVDid:CVE-2002-0339date:2002-06-25T04:00:00