ID

VAR-201309-0449


CVE

CVE-2013-5481


TITLE

Cisco IOS of PPTP Service disruption in implementations (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004346

DESCRIPTION

The PPTP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via crafted TCP port-1723 packets, aka Bug ID CSCtq14817. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. When PPTP packets are not processed correctly when converting packets on the NAT boundary, unauthenticated remote attackers can exploit the vulnerability to overload the device. An unauthenticated remote attacker can repeatedly send some legitimate PPTP packets to the target device. When the affected device handles malicious communication, the race condition can cause a backtracking or cause the device to terminate the operation incorrectly, resulting in a denial of service attack. The following devices are affected by this vulnerability: Cisco IOS 12.2 SXI 12.2(33) SXI7 | 12.2SXJ 12.2(33)SXJ1 | 12.2SY 12.2(50)SY3, 12.2(50)SY4 | 15.0M 15.0(1)M6, 15.0(1) M6a, 15.0(1)M7 | 15.0SY 15.0(1)SY | 15.1M 15.1(4)M1 | 15.1T 15.1(2)T4 | 15.1XB 15.1(4)XB5, 15.1(4)XB5a | 15.2GC 15.2( 1) GC, 15.2(1)GC1, 15.2(1)GC2 | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2. This issue is being tracked by Cisco Bug ID CSCtq14817

Trust: 2.52

sources: NVD: CVE-2013-5481 // JVNDB: JVNDB-2013-004346 // CNVD: CNVD-2013-13327 // BID: 62641 // VULHUB: VHN-65483

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-13327

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.3

Trust: 0.8

vendor:ciscomodel:iosscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxj1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxi7scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2013-13327 // BID: 62641 // JVNDB: JVNDB-2013-004346 // CNNVD: CNNVD-201309-482 // NVD: CVE-2013-5481

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5481
value: HIGH

Trust: 1.0

NVD: CVE-2013-5481
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-13327
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201309-482
value: HIGH

Trust: 0.6

VULHUB: VHN-65483
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5481
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13327
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65483
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-13327 // VULHUB: VHN-65483 // JVNDB: JVNDB-2013-004346 // CNNVD: CNNVD-201309-482 // NVD: CVE-2013-5481

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-65483 // JVNDB: JVNDB-2013-004346 // NVD: CVE-2013-5481

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201309-482

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201309-482

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004346

PATCH

title:cisco-sa-20130925-naturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat

Trust: 0.8

title:30704url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30704

Trust: 0.8

title:cisco-sa-20130925-naturl:http://www.cisco.com/cisco/web/support/JP/111/1119/1119887_cisco-sa-20130925-nat-j.html

Trust: 0.8

title:Cisco IOS NAT Feature PPTP Packet Handling Patch for Remote Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/39850

Trust: 0.6

sources: CNVD: CNVD-2013-13327 // JVNDB: JVNDB-2013-004346

EXTERNAL IDS

db:NVDid:CVE-2013-5481

Trust: 3.4

db:BIDid:62641

Trust: 1.6

db:JVNDBid:JVNDB-2013-004346

Trust: 0.8

db:CNNVDid:CNNVD-201309-482

Trust: 0.7

db:CNVDid:CNVD-2013-13327

Trust: 0.6

db:CISCOid:20130925 CISCO IOS SOFTWARE NETWORK ADDRESS TRANSLATION VULNERABILITIES

Trust: 0.6

db:VULHUBid:VHN-65483

Trust: 0.1

sources: CNVD: CNVD-2013-13327 // VULHUB: VHN-65483 // BID: 62641 // JVNDB: JVNDB-2013-004346 // CNNVD: CNNVD-201309-482 // NVD: CVE-2013-5481

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130925-nat

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5481

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5481

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=30704

Trust: 0.6

url:http://www.securityfocus.com/bid/62641

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

sources: CNVD: CNVD-2013-13327 // VULHUB: VHN-65483 // BID: 62641 // JVNDB: JVNDB-2013-004346 // CNNVD: CNNVD-201309-482 // NVD: CVE-2013-5481

CREDITS

Cisco

Trust: 0.9

sources: BID: 62641 // CNNVD: CNNVD-201309-482

SOURCES

db:CNVDid:CNVD-2013-13327
db:VULHUBid:VHN-65483
db:BIDid:62641
db:JVNDBid:JVNDB-2013-004346
db:CNNVDid:CNNVD-201309-482
db:NVDid:CVE-2013-5481

LAST UPDATE DATE

2025-04-11T22:59:04.581000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13327date:2013-09-29T00:00:00
db:VULHUBid:VHN-65483date:2013-10-07T00:00:00
db:BIDid:62641date:2013-09-25T00:00:00
db:JVNDBid:JVNDB-2013-004346date:2013-09-30T00:00:00
db:CNNVDid:CNNVD-201309-482date:2013-09-27T00:00:00
db:NVDid:CVE-2013-5481date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-13327date:2013-09-27T00:00:00
db:VULHUBid:VHN-65483date:2013-09-27T00:00:00
db:BIDid:62641date:2013-09-25T00:00:00
db:JVNDBid:JVNDB-2013-004346date:2013-09-30T00:00:00
db:CNNVDid:CNNVD-201309-482date:2013-09-27T00:00:00
db:NVDid:CVE-2013-5481date:2013-09-27T10:08:04.353