CVE-2018-0165 (CNNVD-201803-1026)

HIGH
中文标题:
Cisco IOS XE Software 资源管理错误漏洞
英文标题:
A vulnerability in the Internet Group Management Protocol (IGMP) packet-processing functionality of ...
CVSS分数: 7.4
发布时间: 2018-03-28 22:00:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Catalyst 4500 Switches with Supervisor Engine 8-E是美国思科(Cisco)公司的一款交换机产品。IOS XE Software是一套运行在Cisco网络设备中的操作系统。 Cisco IOS XE Software中的Internet Group Management Protocol (IGMP)数据包处理功能存在资源管理错误漏洞,该漏洞源于程序没有充分的处理IGMP Membership Query数据包。攻击者可通过发送大量的IGMP Membership Query数据包利用该漏洞造成拒绝服务(缓冲区耗尽)。以下产品受到影响:使用Supervisor Engine 8-E的Cisco Catalyst 4500 Switches(Cisco IOS XE Software 16.x版本);其他思科产品(Cisco IOS XE Software 16.x版本)。

英文描述:

A vulnerability in the Internet Group Management Protocol (IGMP) packet-processing functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust buffers on an affected device, resulting in a denial of service (DoS) condition, aka a Memory Leak. The vulnerability is due to the affected software insufficiently processing IGMP Membership Query packets that are sent to an affected device. An attacker could exploit this vulnerability by sending a large number of IGMP Membership Query packets, which contain certain values, to an affected device. A successful exploit could allow the attacker to exhaust buffers on the affected device, resulting in a DoS condition that requires the device to be reloaded manually. This vulnerability affects: Cisco Catalyst 4500 Switches with Supervisor Engine 8-E, if they are running Cisco IOS XE Software Release 3.x.x.E and IP multicast routing is configured; Cisco devices that are running Cisco IOS XE Software Release 16.x, if IP multicast routing is configured. Cisco Bug IDs: CSCuw09295, CSCve94496.

CWE类型:
CWE-399 CWE-772
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco ios_xe 15.2\(3\)e - - cpe:2.3:o:cisco:ios_xe:15.2\(3\)e:*:*:*:*:*:*:*
cisco ios_xe denali-16.3.3 - - cpe:2.3:o:cisco:ios_xe:denali-16.3.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1040592 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
103568 vdb-entry
cve.org
访问
CVSS评分详情
7.4
HIGH
CVSS向量: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS版本: 3.0
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2018-03-28 22:00:00
修改时间:
2024-12-02 20:54:22
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:35
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0165 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0165 2025-11-11 14:55:53 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201803-1026 2025-11-11 15:09:59 2025-11-11 07:53:35
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:35
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201803-1026; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201803-1026
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.4; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.4
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']