ID

VAR-201505-0188


CVE

CVE-2015-0744


TITLE

Cisco DTA Control System and Cisco Headend System Release Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-002869

DESCRIPTION

Cisco DTA Control System (DTACS) 4.0.0.9 and Cisco Headend System Release allow remote attackers to cause a denial of service (CPU and memory consumption, and TCP service outage) via (1) a SYN flood or (2) another type of TCP traffic flood, aka Bug IDs CSCus50642, CSCus50662, CSCus50625, CSCus50657, and CSCus68315. Cisco DTACS and Cisco Headend System Release are a front-end broadband digital transmission system. Multiple Cisco products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCus50642, CSCus50662, CSCus50625, CSCus50657, and CSCus68315. The vulnerability is caused by the program not restricting the traffic of TCP port

Trust: 2.52

sources: NVD: CVE-2015-0744 // JVNDB: JVNDB-2015-002869 // CNVD: CNVD-2015-03564 // BID: 74916 // VULHUB: VHN-78690

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03564

AFFECTED PRODUCTS

vendor:ciscomodel:headend system releasescope:eqversion:2.5

Trust: 3.0

vendor:ciscomodel:headend system releasescope:eqversion:2.7

Trust: 3.0

vendor:ciscomodel:headend system releasescope:eqversion:3.2

Trust: 3.0

vendor:ciscomodel:headend system releasescope:eqversion:3.5

Trust: 3.0

vendor:ciscomodel:dta control systemscope:eqversion:4.0.0.9

Trust: 3.0

vendor:ciscomodel:headend system releasescope:eqversion:3.7

Trust: 2.4

vendor:ciscomodel:headend system releasescope:eqversion:i4.3

Trust: 2.4

vendor:ciscomodel:headend digital broadband delivery systemscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:headend digital broadband delivery systemscope: - version: -

Trust: 1.4

vendor:ciscomodel:headend system release 3.7.i4.3scope: - version: -

Trust: 0.6

vendor:ciscomodel:headend system release i4.3scope: - version: -

Trust: 0.6

vendor:ciscomodel:headend system releasesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:dta control system dtacs-4.0.0.9scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-03564 // BID: 74916 // JVNDB: JVNDB-2015-002869 // CNNVD: CNNVD-201505-596 // NVD: CVE-2015-0744

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0744
value: HIGH

Trust: 1.0

NVD: CVE-2015-0744
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-03564
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201505-596
value: HIGH

Trust: 0.6

VULHUB: VHN-78690
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0744
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03564
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78690
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03564 // VULHUB: VHN-78690 // JVNDB: JVNDB-2015-002869 // CNNVD: CNNVD-201505-596 // NVD: CVE-2015-0744

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78690 // JVNDB: JVNDB-2015-002869 // NVD: CVE-2015-0744

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-596

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201505-596

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002869

PATCH

title:38943url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38943

Trust: 0.8

title:Patch for Cisco DTA Control System and Cisco Headend System Release Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/59270

Trust: 0.6

sources: CNVD: CNVD-2015-03564 // JVNDB: JVNDB-2015-002869

EXTERNAL IDS

db:NVDid:CVE-2015-0744

Trust: 3.4

db:BIDid:74916

Trust: 2.0

db:SECTRACKid:1032445

Trust: 1.1

db:JVNDBid:JVNDB-2015-002869

Trust: 0.8

db:CNNVDid:CNNVD-201505-596

Trust: 0.7

db:CNVDid:CNVD-2015-03564

Trust: 0.6

db:VULHUBid:VHN-78690

Trust: 0.1

sources: CNVD: CNVD-2015-03564 // VULHUB: VHN-78690 // BID: 74916 // JVNDB: JVNDB-2015-002869 // CNNVD: CNNVD-201505-596 // NVD: CVE-2015-0744

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38943

Trust: 2.3

url:http://www.securityfocus.com/bid/74916

Trust: 1.1

url:http://www.securitytracker.com/id/1032445

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0744

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0744

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38943

Trust: 0.3

sources: CNVD: CNVD-2015-03564 // VULHUB: VHN-78690 // BID: 74916 // JVNDB: JVNDB-2015-002869 // CNNVD: CNNVD-201505-596 // NVD: CVE-2015-0744

CREDITS

Cisco

Trust: 0.3

sources: BID: 74916

SOURCES

db:CNVDid:CNVD-2015-03564
db:VULHUBid:VHN-78690
db:BIDid:74916
db:JVNDBid:JVNDB-2015-002869
db:CNNVDid:CNNVD-201505-596
db:NVDid:CVE-2015-0744

LAST UPDATE DATE

2025-04-13T23:09:54.464000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03564date:2015-06-04T00:00:00
db:VULHUBid:VHN-78690date:2017-01-04T00:00:00
db:BIDid:74916date:2017-09-07T13:13:00
db:JVNDBid:JVNDB-2015-002869date:2015-06-03T00:00:00
db:CNNVDid:CNNVD-201505-596date:2015-06-05T00:00:00
db:NVDid:CVE-2015-0744date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03564date:2015-06-04T00:00:00
db:VULHUBid:VHN-78690date:2015-05-30T00:00:00
db:BIDid:74916date:2015-05-29T00:00:00
db:JVNDBid:JVNDB-2015-002869date:2015-06-03T00:00:00
db:CNNVDid:CNNVD-201505-596date:2015-05-30T00:00:00
db:NVDid:CVE-2015-0744date:2015-05-30T14:59:02.723