ID

VAR-201110-0013


CVE

CVE-2011-1640


TITLE

Cisco IOS of ethernet-lldp Service disruption in components ( Device crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-002625

DESCRIPTION

The ethernet-lldp component in Cisco IOS 12.2 before 12.2(33)SXJ1 does not properly support a large number of LLDP Management Address (MA) TLVs, which allows remote attackers to cause a denial of service (device crash) via crafted LLDPDUs, aka Bug ID CSCtj22354. Cisco IOS is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCtj22354. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 1.98

sources: NVD: CVE-2011-1640 // JVNDB: JVNDB-2011-002625 // BID: 50377 // VULHUB: VHN-49585

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:ltversion:12.2\(33\)sxj1

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:12.2

Trust: 1.0

vendor:ciscomodel:iosscope:ltversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2(33)sxj1

Trust: 0.8

vendor:ciscomodel:ios 12.2srdscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2srcscope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh8b

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh6

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxi6

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh4

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh3a

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh5

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh8a

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxj

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh8

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh7

Trust: 0.6

vendor:ciscomodel:ios 12.2sxj1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2stescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2soscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2smscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2shscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2segscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sefscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2seescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sedscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2secscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2seascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2piscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2pbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ndscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ncscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ircscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2euscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dzascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxj1scope:neversion: -

Trust: 0.3

sources: BID: 50377 // JVNDB: JVNDB-2011-002625 // CNNVD: CNNVD-201110-564 // NVD: CVE-2011-1640

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1640
value: HIGH

Trust: 1.0

NVD: CVE-2011-1640
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201110-564
value: HIGH

Trust: 0.6

VULHUB: VHN-49585
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-1640
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-49585
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2011-1640
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-49585 // JVNDB: JVNDB-2011-002625 // CNNVD: CNNVD-201110-564 // NVD: CVE-2011-1640

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-49585 // JVNDB: JVNDB-2011-002625 // NVD: CVE-2011-1640

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201110-564

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201110-564

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002625

PATCH

title:caveats_SXJurl:http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-002625

EXTERNAL IDS

db:NVDid:CVE-2011-1640

Trust: 2.8

db:JVNDBid:JVNDB-2011-002625

Trust: 0.8

db:CNNVDid:CNNVD-201110-564

Trust: 0.7

db:BIDid:50377

Trust: 0.4

db:VULHUBid:VHN-49585

Trust: 0.1

sources: VULHUB: VHN-49585 // BID: 50377 // JVNDB: JVNDB-2011-002625 // CNNVD: CNNVD-201110-564 // NVD: CVE-2011-1640

REFERENCES

url:http://www.cisco.com/en/us/docs/switches/lan/catalyst6500/ios/12.2sx/release/notes/caveats_sxj.html

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1640

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1640

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-49585 // BID: 50377 // JVNDB: JVNDB-2011-002625 // CNNVD: CNNVD-201110-564 // NVD: CVE-2011-1640

CREDITS

Cisco

Trust: 0.3

sources: BID: 50377

SOURCES

db:VULHUBid:VHN-49585
db:BIDid:50377
db:JVNDBid:JVNDB-2011-002625
db:CNNVDid:CNNVD-201110-564
db:NVDid:CVE-2011-1640

LAST UPDATE DATE

2025-04-11T23:08:57.247000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-49585date:2020-08-05T00:00:00
db:BIDid:50377date:2015-03-19T08:49:00
db:JVNDBid:JVNDB-2011-002625date:2011-10-31T00:00:00
db:CNNVDid:CNNVD-201110-564date:2011-10-24T00:00:00
db:NVDid:CVE-2011-1640date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-49585date:2011-10-22T00:00:00
db:BIDid:50377date:2011-10-26T00:00:00
db:JVNDBid:JVNDB-2011-002625date:2011-10-31T00:00:00
db:CNNVDid:CNNVD-201110-564date:2011-10-24T00:00:00
db:NVDid:CVE-2011-1640date:2011-10-22T02:59:19.073