First published: Fri Sep 27 2013(Updated: )
The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCuf28733.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2 | |
Cisco IOS | =15.0 | |
Cisco IOS | =15.1 | |
Cisco IOS | =15.2 | |
Cisco IOS | =15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5480 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2013-5480, upgrade to a non-vulnerable version of Cisco IOS that is later than 15.3.
CVE-2013-5480 affects Cisco IOS versions 12.2, 15.0, 15.1, 15.2, and 15.3 when NAT is used.
The attack vector for CVE-2013-5480 is a crafted IPv4 DNS TCP stream sent to a vulnerable Cisco device.
Yes, CVE-2013-5480 can be exploited remotely, allowing attackers to trigger a device reload.