CVE-2018-0421
Cisco Prime Access Registrar Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained.
Una vulnerabilidad en la administración de las conexiones TCP en Cisco Prime Access Registrar podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) cuando la aplicación se reinicia de manera inesperada. Esta vulnerabilidad se debe al manejo incorrecto de los paquetes TCP SYN en puertos de escucha específicos. El manejo incorrecto de los paquetes TCP SYN podría provocar que se asigne y no se libere una descripción de un archivo del sistema. Un atacante podría explotar esta vulnerabilidad enviando un flujo manipulado de paquetes TCP SYN a la aplicación. Su explotación con éxito podría permitir que el atacante provoque que la aplicación acabe por reiniciarse si no se puede obtener una descripción de archivo.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-27 CVE Reserved
- 2018-10-05 CVE Published
- 2024-06-20 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
- CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/105282 | Third Party Advisory | |
http://www.securitytracker.com/id/1041684 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Prime Access Registrar Search vendor "Cisco" for product "Prime Access Registrar" | >= 7.3 < 7.3.0.4 Search vendor "Cisco" for product "Prime Access Registrar" and version " >= 7.3 < 7.3.0.4" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Prime Access Registrar Search vendor "Cisco" for product "Prime Access Registrar" | >= 8.0 < 8.0.1.1 Search vendor "Cisco" for product "Prime Access Registrar" and version " >= 8.0 < 8.0.1.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Prime Access Registrar Jumpstart Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" | >= 7.3 < 7.3.0.4 Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" and version " >= 7.3 < 7.3.0.4" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Prime Access Registrar Jumpstart Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" | >= 8.0 < 8.0.1.1 Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" and version " >= 8.0 < 8.0.1.1" | - |
Affected
|