Vulnerability Details : CVE-2011-4007
Cisco IOS 15.0 and 15.1 and IOS XE 3.x do not properly handle the "set mpls experimental imposition" command, which allows remote attackers to cause a denial of service (device crash) via network traffic that triggers (1) fragmentation or (2) reassembly, aka Bug ID CSCtr56576.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-4007
Probability of exploitation activity in the next 30 days: 0.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 57 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-4007
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.4
|
MEDIUM | AV:N/AC:H/Au:N/C:N/I:N/A:C |
4.9
|
6.9
|
NIST |
CWE ids for CVE-2011-4007
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4007
-
http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_33s.html
Cisco IOS XE 3S Release Notes - Release 3.3S Caveats [Cisco IOS XE 3S] - Cisco
-
http://www.securitytracker.com/id?1027005
Cisco IOS Multiple Bugs Let Remote Users Bypass Security Controls, Obtain Potentially Sensitive Information, and Deny Service - SecurityTracker
Products affected by CVE-2011-4007
- cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*