Vulnerability Details : CVE-2014-3356
The metadata flow feature in Cisco IOS 15.1 through 15.3 and IOS XE 3.3.xXO before 3.3.1XO, 3.6.xS and 3.7.xS before 3.7.6S, and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allows remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCue22753.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3356
Probability of exploitation activity in the next 30 days: 1.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3356
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-3356
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3356
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96176
Cisco IOS RSVP denial of service CVE-2014-3356 Vulnerability Report
-
http://www.securitytracker.com/id/1030894
Cisco IOS RSVP Flow Metadata Bug Lets Remote Users Deny Service - SecurityTracker
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata
Cisco IOS Software Metadata VulnerabilitiesVendor Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml
-
http://www.securityfocus.com/bid/70135
Cisco IOS and IOS XE Software CVE-2014-3356 Denial of Service Vulnerability
Products affected by CVE-2014-3356
- cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(3\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(1a\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(0\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(1\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3\(.0\)xo:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(4\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(5\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.10s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(1\)as:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(0\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(0\)s:*:*:*:*:*:*:*