CVE-2015-0681

Severity

71%

Complexity

86%

Confidentiality

115%

The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733.

The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733.

CVSS 2.0 Base Score 7.1. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C).

Overview

Type

Cisco IOS

First reported 9 years ago

2015-07-24 16:59:00

Last updated 7 years ago

2017-09-21 01:29:00

Affected Software

Cisco IOS 12.2(33)XN1

12.2\(33\)xn1

Cisco IOS 12.2(44)SQ1

12.2\(44\)sq1

Cisco IOS 12.4(23)JY

12.4\(23\)jy

Cisco IOS 12.4(25E)JAM1

12.4\(25e\)jam1

Cisco IOS 12.4(25E)JAO5M

12.4\(25e\)jao5m

Cisco IOS 15.0(2)ED1

15.0\(2\)ed1

Cisco IOS 15.0(2)EY3

15.0\(2\)ey3

Cisco IOS 15.1(3)SVF4A

15.1\(3\)svf4a

Cisco IOS 15.2(2)JB1

15.2\(2\)jb1

Cisco IOS XE 2.5.0

2.5.0

Cisco IOS XE 2.5.1

2.5.1

Cisco IOS XE 2.5.2

2.5.2

Cisco IOS XE 2.6.0

2.6.0

Cisco IOS XE 2.6.1

2.6.1

Cisco IOS XE 2.6.2

2.6.2

Cisco IOS XE Software 3.1S.0

3.1s.0

Cisco IOS XE Software 3.1S.1

3.1s.1

Cisco IOS XE Software 3.1S.2

3.1s.2

Cisco IOS XE Software 3.1S.3

3.1s.3

Cisco IOS XE Software 3.1S.4

3.1s.4

Cisco IOS XE Software 3.1S.5

3.1s.5

Cisco IOS XE Software 3.1S.6

3.1s.6

Cisco IOS XE 3.1SG.0

3.1sg.0

Cisco IOS XE 3.1SG.1

3.1sg.1

Cisco IOS XE Software 3.2S.0

3.2s.0

Cisco IOS XE Software 3.2S.1

3.2s.1

Cisco IOS XE Software 3.2S.2

3.2s.2

Cisco IOS XE Software 3.2S.3

3.2s.3

Cisco IOS XE 3.2SE.0

3.2se.0

Cisco IOS XE 3.2SE.1

3.2se.1

Cisco IOS XE 3.2SE.2

3.2se.2

Cisco IOS XE 3.2SE.3

3.2se.3

Cisco IOS XE 3.2SG.0

3.2sg.0

Cisco IOS XE 3.2SG.1

3.2sg.1

Cisco IOS XE 3.2SG.2

3.2sg.2

Cisco IOS XE 3.2SG.3

3.2sg.3

Cisco IOS XE 3.2SG.4

3.2sg.4

Cisco IOS XE 3.2SG.5

3.2sg.5

Cisco IOS XE 3.2SG.6

3.2sg.6

Cisco IOS XE 3.2SG.7

3.2sg.7

Cisco IOS XE 3.2SG.8

3.2sg.8

Cisco IOS XE 3.2SG.9

3.2sg.9

Cisco IOS XE 3.2XO.0

3.2xo.0

Cisco IOS XE 3.2XO.1

3.2xo.1

Cisco IOS XE Software 3.3SG.0

3.3sg.0

Cisco IOS XE Software 3.3SG.1

3.3sg.1

Cisco IOS XE Software 3.3SG.2

3.3sg.2

Cisco IOS XE 3.3SQ.0

3.3sq.0

Cisco IOS XE 3.3SQ.1

3.3sq.1

Cisco IOS XE Software 3.4S.0

3.4s.0

Cisco IOS XE Software 3.4S.1

3.4s.1

Cisco IOS XE Software 3.4S.2

3.4s.2

Cisco IOS XE Software 3.4S.3

3.4s.3

Cisco IOS XE Software 3.4S.4

3.4s.4

Cisco IOS XE Software 3.4S.5

3.4s.5

Cisco IOS XE Software 3.4S.6

3.4s.6

Cisco IOS XE 3.4SQ.0

3.4sq.0

Cisco IOS XE 3.4SQ.1

3.4sq.1

Cisco IOS XE Software 3.5S.0

3.5s.0

Cisco IOS XE Software 3.5S.1

3.5s.1

Cisco IOS XE Software 3.5S.2

3.5s.2

Cisco IOS XE Software 3.5s BASE

3.5s_base

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.