CVE-2018-0369 (CNNVD-201807-1219)
中文标题:
多款Cisco产品Cisco StarOS 输入验证漏洞
英文标题:
A vulnerability in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtu...
漏洞描述
中文描述:
Cisco Virtualized Packet Core-Single Instance(VPC-SI)、Virtualized Packet Core-Distributed Instance(VPC-DI)和Ultra Packet Core(UPC)都是美国思科(Cisco)公司的被部署在专用硬件平台的StarOS软件的产品化版本。Cisco StarOS是其中的一套虚拟化操作系统。 多款Cisco产品中的Cisco StarOS中对IPv4数据包片段的组装逻辑存在输入验证漏洞,该漏洞源于程序没有正确的处理IPv4数据包。远程攻击者可通过发送恶意的IPv4数据包利用该漏洞造成拒绝服务。以下产品受到影响:Cisco Virtualized Packet Core-Single Instance (VPC-SI);Cisco Virtualized Packet Core-Distributed Instance (VPC-DI);Cisco Ultra Packet Core (UPC)。
英文描述:
A vulnerability in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms could allow an unauthenticated, remote attacker to trigger a reload of the npusim process, resulting in a denial of service (DoS) condition. There are four instances of the npusim process running per Service Function (SF) instance, each handling a subset of all traffic flowing across the device. It is possible to trigger a reload of all four instances of the npusim process around the same time. The vulnerability is due to improper handling of fragmented IPv4 packets containing options. An attacker could exploit this vulnerability by sending a malicious IPv4 packet across an affected device. An exploit could allow the attacker to trigger a restart of the npusim process, which will result in all traffic queued toward this instance of the npusim process to be dropped while the process is restarting. The npusim process typically restarts within less than a second. This vulnerability affects: Cisco Virtualized Packet Core-Single Instance (VPC-SI), Cisco Virtualized Packet Core-Distributed Instance (VPC-DI), Cisco Ultra Packet Core (UPC). Cisco Bug IDs: CSCvh29613.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | staros | * | - | - |
cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-0369 |
2025-11-11 15:19:35 | 2025-11-11 07:34:57 |
| NVD | nvd_CVE-2018-0369 |
2025-11-11 14:55:56 | 2025-11-11 07:43:33 |
| CNNVD | cnnvd_CNNVD-201807-1219 |
2025-11-11 15:10:03 | 2025-11-11 07:53:49 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-201807-1219
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 8.6
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']