Vulnerability Details : CVE-2014-3355
The metadata flow feature in Cisco IOS 15.1 through 15.3 and IOS XE 3.3.xXO before 3.3.1XO, 3.6.xS and 3.7.xS before 3.7.6S, and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allows remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCug75942.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3355
Probability of exploitation activity in the next 30 days: 1.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3355
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-3355
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3355
-
http://www.securitytracker.com/id/1030894
Cisco IOS RSVP Flow Metadata Bug Lets Remote Users Deny Service - SecurityTracker
-
http://www.securityfocus.com/bid/70130
Cisco IOS and IOS XE Software CVE-2014-3355 Denial of Service Vulnerability
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata
Cisco IOS Software Metadata VulnerabilitiesVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96175
Cisco IOS metadata flow feature denial of service CVE-2014-3355 Vulnerability Report
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml
Products affected by CVE-2014-3355
- cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(3\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(1a\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(0\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(1\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3\(.0\)xo:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(4\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(5\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.10s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(1\)as:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.7\(0\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.8\(2\)s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.9\(0\)s:*:*:*:*:*:*:*