CVE-2014-3291

Cisco Wireless LAN Controller (WLC) devices allow remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a zero value in Cisco Discovery Protocol packet data that is not properly handled during SNMP polling, aka Bug ID CSCuo12321.
Configurations

Configuration 1 (hide)

cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://secunia.com/advisories/57895 - Permissions Required () http://secunia.com/advisories/57895 - Permissions Required
References () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3291 - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3291 - Vendor Advisory
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=34558 - Vendor Advisory () http://tools.cisco.com/security/center/viewAlert.x?alertId=34558 - Vendor Advisory
References () http://www.securityfocus.com/bid/67926 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67926 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1030410 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030410 - Third Party Advisory, VDB Entry

Information

Published : 2014-06-08 16:55

Updated : 2024-11-21 02:07


NVD link : CVE-2014-3291

Mitre link : CVE-2014-3291

CVE.ORG link : CVE-2014-3291


JSON object : View

Products Affected

cisco

  • wireless_lan_controller
CWE
CWE-20

Improper Input Validation