First published: Thu Jan 23 2014(Updated: )
The OSPF implementation on NEC IP38X, IX1000, IX2000, and IX3000 routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NEC IP38X 1000 | ||
NEC IP38X 105 | ||
NEC IP38X 107e | ||
NEC IP38X 1100 | ||
NEC IP38X 1200 | ||
NEC IP38X 140 | ||
NEC IP38X 1500 | ||
NEC IP38X 2000 | ||
NEC IP38X 250i | ||
NEC IP38X 300 | ||
NEC IP38X 3000 | ||
NEC IP38X 810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-7314 is classified as high due to its potential to cause a denial of service.
To fix CVE-2013-7314, ensure that your NEC IP38X series routers are updated to the latest firmware that addresses this vulnerability.
CVE-2013-7314 affects NEC IP38X, IX1000, IX2000, and IX3000 routers along with several specific models within the IP38X series.
CVE-2013-7314 facilitates a denial of service attack through the exploitation of duplicate Link State ID values in Link State Advertisement packets.
Yes, CVE-2013-7314 is remotely exploitable, allowing attackers to disrupt routing operations from a distant location.