CVE-2011-3274

Severity

61%

Complexity

65%

Confidentiality

115%

Unspecified vulnerability in Cisco IOS 12.2SRE before 12.2(33)SRE4, 15.0, and 15.1, and IOS XE 2.1.x through 3.3.x, when an MPLS domain is configured, allows remote attackers to cause a denial of service (device crash) via a crafted IPv6 packet, related to an expired MPLS TTL, aka Bug ID CSCto07919.

Unspecified vulnerability in Cisco IOS 12.2SRE before 12.2(33)SRE4, 15.0, and 15.1, and IOS XE 2.1.x through 3.3.x, when an MPLS domain is configured, allows remote attackers to cause a denial of service (device crash) via a crafted IPv6 packet, related to an expired MPLS TTL, aka Bug ID CSCto07919.

CVSS 2.0 Base Score 6.1. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:C).

Overview

Type

Cisco IOS

First reported 13 years ago

2011-10-03 23:55:00

Last updated 13 years ago

2012-05-14 04:00:00

Affected Software

Cisco IOS 12.2 (33)SRE

12.2\(33\)sre

Cisco IOS 12.2 (33)SRE0a

12.2\(33\)sre0a

Cisco IOS 12.2 (33)SRE1

12.2\(33\)sre1

Cisco IOS 12.2 (33)SRE2

12.2\(33\)sre2

Cisco IOS 12.2 (33)SRE3

12.2\(33\)sre3

Cisco IOS 12.2SRE

12.2sre

Cisco IOS 15.0

15.0

Cisco IOS 15.1

15.1

Cisco IOS XE 2.1.0

2.1.0

Cisco IOS XE 2.1.1

2.1.1

Cisco IOS XE 2.1.2

2.1.2

Cisco IOS XE 2.2.1

2.2.1

Cisco IOS XE 2.2.2

2.2.2

Cisco IOS XE 2.2.3

2.2.3

Cisco IOS XE 2.3.0

2.3.0

Cisco IOS XE 2.3.1

2.3.1

Cisco IOS XE 2.3.2

2.3.2

Cisco IOS XE 2.4.0

2.4.0

Cisco IOS XE 2.4.1

2.4.1

Cisco IOS XE 2.4.2

2.4.2

Cisco IOS XE 2.4.3

2.4.3

Cisco IOS XE 2.4.4

2.4.4

Cisco IOS XE 2.5.0

2.5.0

Cisco IOS XE 2.5.1

2.5.1

Cisco IOS XE 2.5.2

2.5.2

Cisco IOS XE 2.6.0

2.6.0

Cisco IOS XE 2.6.1

2.6.1

Cisco IOS XE 2.6.2

2.6.2

Cisco IOS XE 3.1.0s

3.1.0s

Cisco IOS XE 3.1.1s

3.1.1s

Cisco IOS XE 3.1.2s

3.1.2s

Cisco IOS XE 3.1.3s

3.1.3s

Cisco IOS XE 3.1.4s

3.1.4s

Cisco IOS XE 3.2.0s

3.2.0s

Cisco IOS XE 3.2.1s

3.2.1s

Cisco IOS XE 3.2.2s

3.2.2s

Cisco IOS XE 3.3.0s

3.3.0s

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.