ID

VAR-201303-0389


CVE

CVE-2013-1142


TITLE

Cisco IOS of VRF-aware NAT Service disruption in functionality ( Memory consumption ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002080

DESCRIPTION

Race condition in the VRF-aware NAT feature in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 allows remote attackers to cause a denial of service (memory consumption) via IPv4 packets, aka Bug IDs CSCtg47129 and CSCtz96745. Cisco IOS is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to reload or become unresponsive, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCtg47129. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 1.98

sources: NVD: CVE-2013-1142 // JVNDB: JVNDB-2013-002080 // BID: 58745 // VULHUB: VHN-61144

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:12.4

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:15.0

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:12.2

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:15.2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2 to 12.4

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2zm

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zq

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zn

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zo

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zh

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zx

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zi

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zj

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zk

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2zya

Trust: 0.6

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mdbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mdascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t8)scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2smscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2segscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ircscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2fxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ewscope: - version: -

Trust: 0.3

sources: BID: 58745 // JVNDB: JVNDB-2013-002080 // CNNVD: CNNVD-201303-562 // NVD: CVE-2013-1142

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1142
value: HIGH

Trust: 1.0

NVD: CVE-2013-1142
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201303-562
value: HIGH

Trust: 0.6

VULHUB: VHN-61144
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1142
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61144
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61144 // JVNDB: JVNDB-2013-002080 // CNNVD: CNNVD-201303-562 // NVD: CVE-2013-1142

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-61144 // JVNDB: JVNDB-2013-002080 // NVD: CVE-2013-1142

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201303-562

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201303-562

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002080

PATCH

title:cisco-sa-20130327-naturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat

Trust: 0.8

title:Cisco IOS Software VRF-Aware NAT Memory Starvation Vulnerability url:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1142

Trust: 0.8

title:cisco-sa-20130327-naturl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117675_cisco-sa-20130327-nat-j.html

Trust: 0.8

title:Cisco IOS Network Address Translation Remediation measures for remote denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125163

Trust: 0.6

sources: JVNDB: JVNDB-2013-002080 // CNNVD: CNNVD-201303-562

EXTERNAL IDS

db:NVDid:CVE-2013-1142

Trust: 2.8

db:JVNDBid:JVNDB-2013-002080

Trust: 0.8

db:CNNVDid:CNNVD-201303-562

Trust: 0.7

db:BIDid:58745

Trust: 0.4

db:VULHUBid:VHN-61144

Trust: 0.1

sources: VULHUB: VHN-61144 // BID: 58745 // JVNDB: JVNDB-2013-002080 // CNNVD: CNNVD-201303-562 // NVD: CVE-2013-1142

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130327-nat

Trust: 1.7

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-1142

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1142

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1142

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-61144 // BID: 58745 // JVNDB: JVNDB-2013-002080 // CNNVD: CNNVD-201303-562 // NVD: CVE-2013-1142

CREDITS

Cisco

Trust: 0.9

sources: BID: 58745 // CNNVD: CNNVD-201303-562

SOURCES

db:VULHUBid:VHN-61144
db:BIDid:58745
db:JVNDBid:JVNDB-2013-002080
db:CNNVDid:CNNVD-201303-562
db:NVDid:CVE-2013-1142

LAST UPDATE DATE

2025-04-11T23:12:01.354000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61144date:2020-07-28T00:00:00
db:BIDid:58745date:2015-03-19T09:05:00
db:JVNDBid:JVNDB-2013-002080date:2013-04-23T00:00:00
db:CNNVDid:CNNVD-201303-562date:2020-07-29T00:00:00
db:NVDid:CVE-2013-1142date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-61144date:2013-03-28T00:00:00
db:BIDid:58745date:2013-03-27T00:00:00
db:JVNDBid:JVNDB-2013-002080date:2013-04-01T00:00:00
db:CNNVDid:CNNVD-201303-562date:2013-03-28T00:00:00
db:NVDid:CVE-2013-1142date:2013-03-28T23:55:01.547