The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
Advisories
Source ID Title
EUVD EUVD EUVD-2013-0192 The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T14:18:09.198Z

Reserved: 2012-12-06T00:00:00

Link: CVE-2013-0149

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-08-05T13:22:47.847

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-0149

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-08-01T00:00:00Z

Links: CVE-2013-0149 - Bugzilla

cve-icon OpenCVE Enrichment

No data.