CVE-2018-0175

Format String vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCvd73664.
References
Link Resource
http://www.securityfocus.com/bid/103564 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040586 Broken Link Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 Third Party Advisory US Government Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:cisco:ios:15.4\(3\)m4.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:cisco:ios_xe:15.4\(3\)m4.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:cisco:ios_xr:15.4\(3\)m4.1:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300_industrial_managed_ethernet_switch:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
OR cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*

History

24 Jul 2024, 14:10

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103564 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103564 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040586 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040586 - Broken Link, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300_industrial_managed_ethernet_switch:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
First Time Rockwellautomation allen-bradley Stratix 8300 Industrial Managed Ethernet Switch

Information

Published : 2018-03-28 22:29

Updated : 2024-07-24 14:10


NVD link : CVE-2018-0175

Mitre link : CVE-2018-0175

CVE.ORG link : CVE-2018-0175


JSON object : View

Products Affected

rockwellautomation

  • allen-bradley_stratix_5400
  • allen-bradley_stratix_5700
  • allen-bradley_stratix_5410
  • allen-bradley_stratix_8300_industrial_managed_ethernet_switch
  • allen-bradley_stratix_5900_services_router
  • allen-bradley_armorstratix_5700
  • allen-bradley_stratix_8000

cisco

  • ios
  • ios_xr
  • ios_xe
CWE
CWE-134

Use of Externally-Controlled Format String

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer