CVE-2018-0239 (CNNVD-201804-1103)

HIGH
中文标题:
Cisco Aggregation Services Router 5000 Series Routers和Virtualized Packet Core System Software StarOS 输入验证错误漏洞
英文标题:
A vulnerability in the egress packet processing functionality of the Cisco StarOS operating system f...
CVSS分数: 7.5
发布时间: 2018-04-19 20:00:00
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Aggregation Services Router(ASR)5000 Series Routers和Virtualized Packet Core(VPC)System Software都是美国思科(Cisco)公司的产品。Cisco Aggregation Services Router(ASR)5000 Series Routers是一款5000系列的安全路由器设备。Virtualized Packet Core(VPC)System Software是一套被部署在专用硬件平台的StarOS软件的产品化版本。StarOS是使用在其中的一套操作系统。 Cisco ASR 5700 Series和VPC System Software中的StarOS存在输入验证漏洞,该漏洞源于程序没有正确的校验传输数据包的长度是否超过了网卡所支持的最大长度。远程攻击者可通过发送特制的数据包或大量特制的IP片段利用该漏洞造成界面无法发送数据包。以下产品受到影响:Cisco Aggregation Services Router (ASR) 5700 Series;Virtualized Packet Core-Distributed Instance (VPC-DI) System Software,Virtualized Packet Core-Single Instance (VPC-SI) System Software。

英文描述:

A vulnerability in the egress packet processing functionality of the Cisco StarOS operating system for Cisco Aggregation Services Router (ASR) 5700 Series devices and Virtualized Packet Core (VPC) System Software could allow an unauthenticated, remote attacker to cause an interface on the device to cease forwarding packets. The device may need to be manually reloaded to clear this Interface Forwarding Denial of Service condition. The vulnerability is due to the failure to properly check that the length of a packet to transmit does not exceed the maximum supported length of the network interface card (NIC). An attacker could exploit this vulnerability by sending a crafted IP packet or a series of crafted IP fragments through an interface on the targeted device. A successful exploit could allow the attacker to cause the network interface to cease forwarding packets. This vulnerability could be triggered by either IPv4 or IPv6 network traffic. This vulnerability affects the following Cisco products when they are running the StarOS operating system and a virtual interface card is installed on the device: Aggregation Services Router (ASR) 5700 Series, Virtualized Packet Core-Distributed Instance (VPC-DI) System Software, Virtualized Packet Core-Single Instance (VPC-SI) System Software. Cisco Bug IDs: CSCvf32385.

CWE类型:
CWE-20 CWE-770
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco staros 21.0.v0.65819 - - cpe:2.3:o:cisco:staros:21.0.v0.65819:*:*:*:*:*:*:*
cisco staros 21.0.v4 - - cpe:2.3:o:cisco:staros:21.0.v4:*:*:*:*:*:*:*
cisco staros 21.1.v6 - - cpe:2.3:o:cisco:staros:21.1.v6:*:*:*:*:*:*:*
cisco staros 21.3.1 - - cpe:2.3:o:cisco:staros:21.3.1:*:*:*:*:*:*:*
cisco staros 21.4.0 - - cpe:2.3:o:cisco:staros:21.4.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
103923 vdb-entry
cve.org
访问
1040720 vdb-entry
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2018-04-19 20:00:00
修改时间:
2024-11-29 15:17:20
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:39
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0239 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0239 2025-11-11 14:55:54 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201804-1103 2025-11-11 15:10:00 2025-11-11 07:53:39
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:39
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-201804-1103; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-201804-1103
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 5; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 5
  • data_sources: ['cve'] -> ['cve', 'nvd']