CVE-2013-5475
https://notcve.org/view.php?id=CVE-2013-5475
Cisco IOS 12.2 through 12.4 and 15.0 through 15.3, and IOS XE 2.1 through 3.9, allows remote attackers to cause a denial of service (device reload) via crafted DHCP packets that are processed locally by a (1) server or (2) relay agent, aka Bug ID CSCug31561. Cisco IOS 12.2 hasta 12.4 y 15.0 hasta 15.3, y IOS XE 2.1 hasta 3.9, permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo) a través depaquetes DHCP manipulados que son procesados localmente por un (1) servidor o (2) agente transmisor, tambien conocido como Bug ID CSCug31561. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-dhcp • CWE-20: Improper Input Validation •
CVE-2013-5474
https://notcve.org/view.php?id=CVE-2013-5474
Race condition in the IPv6 virtual fragmentation reassembly (VFR) implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.3 allows remote attackers to cause a denial of service (device reload or hang) via fragmented IPv6 packets, aka Bug ID CSCud64812. Condición de carrera en la implementación de IPv6 virtual fragmentation reassembly (VFR) en Cisco IOS 12.2 hasta 12.4 y 15.0 hasta 15.3 permite a un atacante remoto causar una denegación de servicio (recarga o cuelgue de dispositivo) a través de paquetes IPv6 fragmentados, tambien conocido como Bug ID CSCud64812. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ipv6vfr • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2013-0149
https://notcve.org/view.php?id=CVE-2013-0149
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795. La implementación OSFPF en Cisco IOS v12.0 hasta la v 12.4 y v15.0 hasta v15.3, IOS-XE v2.x hasta la v3.9.xS, ASA y PIX 7.x hasta la v9.1, FWSM, NX-OS, y StarOS anterior a v14.0.50488 no valida correctamente los paquetes Link State Advertisement (LSA) tipo 1 antes de realizar operaciones en la base de datos LSA, lo que permite a atacantes remotos provocar una denegación de servicio (interrupción del enrutamiento) u obtener información sensible a través de un paquete (1) unicast o (2) un paquete de multidifusión, también conocido como Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, y CSCug39795. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf http://www.kb.cert.org/vuls/id/229804 •
CVE-2013-1143
https://notcve.org/view.php?id=CVE-2013-1143
The RSVP protocol implementation in Cisco IOS 12.2 and 15.0 through 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S, when MPLS-TE is enabled, allows remote attackers to cause a denial of service (incorrect memory access and device reload) via a traffic engineering PATH message in an RSVP packet, aka Bug ID CSCtg39957. La implementación del protocolo RSVP en Cisco IOS 12.2 y 15.0 a la 15.2 e IOS XE 3.1.xS a la 3.4.xS anteior a 3.4.5S y 3.5.xS a la 3.7.xS anterior a 3.7.2S, cuando está activado MPLS-TE, permite a atacantes remotos provocar una denegación de servicio (acceso incorrecto a memoria y recarga de dispositivo) a través de un mensaje del tipo "traffic engineering PATH" en un paquete RSVP. Aka Bug ID CSCtg39957. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-rsvp http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1143 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-1142
https://notcve.org/view.php?id=CVE-2013-1142
Race condition in the VRF-aware NAT feature in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 allows remote attackers to cause a denial of service (memory consumption) via IPv4 packets, aka Bug IDs CSCtg47129 and CSCtz96745. Condición de carrera en la funcionalidad VRF-Aware NAT en Cisco IOS 12.2 a la 12.4 y 15.0 a la 15.2, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de paquetes IPv4. Aka Bug IDs CSCtg47129 y CSCtz96745. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1142 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •