ID

VAR-201309-0447


CVE

CVE-2013-5479


TITLE

Cisco IOS of DNS-over-TCP Service disruption in implementations (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004344

DESCRIPTION

The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCtn53730. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A security vulnerability exists in Cisco IOS Software that unauthenticated remote attackers can exploit vulnerabilities to overload devices. The vulnerability is caused by improper processing of DNS packets that need to be translated through the NAT boundary. The attacker uses the vulnerability to continuously send certain DNS packets to the target device. When a malicious packet is processed, a bus error can cause the device to reset. Denial of service attack. The following devices are affected by this vulnerability: Cisco IOS 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M2 | 15.1T 15.1(3)T, 15.1( 3) T1, 15.1(3)T2 | 15.1XB 15.1(4)XB4, 15.1(4)XB5, 15.1(4)XB5a, 15.1(4)XB6 | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2 | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1)T3a, 15.2(1)T4. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCtn53730

Trust: 2.52

sources: NVD: CVE-2013-5479 // JVNDB: JVNDB-2013-004344 // CNVD: CNVD-2013-13329 // BID: 62639 // VULHUB: VHN-65481

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-13329

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.3

Trust: 0.8

vendor:ciscomodel:iosscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 tscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2013-13329 // BID: 62639 // JVNDB: JVNDB-2013-004344 // CNNVD: CNNVD-201309-481 // NVD: CVE-2013-5479

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5479
value: HIGH

Trust: 1.0

NVD: CVE-2013-5479
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-13329
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201309-481
value: HIGH

Trust: 0.6

VULHUB: VHN-65481
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5479
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13329
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65481
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-13329 // VULHUB: VHN-65481 // JVNDB: JVNDB-2013-004344 // CNNVD: CNNVD-201309-481 // NVD: CVE-2013-5479

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-65481 // JVNDB: JVNDB-2013-004344 // NVD: CVE-2013-5479

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201309-481

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201309-481

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004344

PATCH

title:cisco-sa-20130925-naturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat

Trust: 0.8

title:30702url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30702

Trust: 0.8

title:cisco-sa-20130925-naturl:http://www.cisco.com/cisco/web/support/JP/111/1119/1119887_cisco-sa-20130925-nat-j.html

Trust: 0.8

title:Patch for Cisco IOS Network Address Translation Remote Denial of Service Vulnerability (CNVD-2013-13329)url:https://www.cnvd.org.cn/patchInfo/show/39849

Trust: 0.6

sources: CNVD: CNVD-2013-13329 // JVNDB: JVNDB-2013-004344

EXTERNAL IDS

db:NVDid:CVE-2013-5479

Trust: 3.4

db:BIDid:62639

Trust: 1.6

db:JVNDBid:JVNDB-2013-004344

Trust: 0.8

db:CNNVDid:CNNVD-201309-481

Trust: 0.7

db:CNVDid:CNVD-2013-13329

Trust: 0.6

db:CISCOid:20130925 CISCO IOS SOFTWARE NETWORK ADDRESS TRANSLATION VULNERABILITIES

Trust: 0.6

db:VULHUBid:VHN-65481

Trust: 0.1

sources: CNVD: CNVD-2013-13329 // VULHUB: VHN-65481 // BID: 62639 // JVNDB: JVNDB-2013-004344 // CNNVD: CNNVD-201309-481 // NVD: CVE-2013-5479

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130925-nat

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5479

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5479

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=30702

Trust: 0.6

url:http://www.securityfocus.com/bid/62639

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

sources: CNVD: CNVD-2013-13329 // VULHUB: VHN-65481 // BID: 62639 // JVNDB: JVNDB-2013-004344 // CNNVD: CNNVD-201309-481 // NVD: CVE-2013-5479

CREDITS

Cisco

Trust: 0.9

sources: BID: 62639 // CNNVD: CNNVD-201309-481

SOURCES

db:CNVDid:CNVD-2013-13329
db:VULHUBid:VHN-65481
db:BIDid:62639
db:JVNDBid:JVNDB-2013-004344
db:CNNVDid:CNNVD-201309-481
db:NVDid:CVE-2013-5479

LAST UPDATE DATE

2025-04-11T22:59:04.650000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13329date:2013-09-29T00:00:00
db:VULHUBid:VHN-65481date:2013-10-07T00:00:00
db:BIDid:62639date:2013-09-25T00:00:00
db:JVNDBid:JVNDB-2013-004344date:2013-10-23T00:00:00
db:CNNVDid:CNNVD-201309-481date:2013-09-27T00:00:00
db:NVDid:CVE-2013-5479date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-13329date:2013-09-27T00:00:00
db:VULHUBid:VHN-65481date:2013-09-27T00:00:00
db:BIDid:62639date:2013-09-25T00:00:00
db:JVNDBid:JVNDB-2013-004344date:2013-09-30T00:00:00
db:CNNVDid:CNNVD-201309-481date:2013-09-27T00:00:00
db:NVDid:CVE-2013-5479date:2013-09-27T10:08:04.320