Vulnerability Description
A vulnerability in the Internet Group Management Protocol (IGMP) packet-processing functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust buffers on an affected device, resulting in a denial of service (DoS) condition, aka a Memory Leak. The vulnerability is due to the affected software insufficiently processing IGMP Membership Query packets that are sent to an affected device. An attacker could exploit this vulnerability by sending a large number of IGMP Membership Query packets, which contain certain values, to an affected device. A successful exploit could allow the attacker to exhaust buffers on the affected device, resulting in a DoS condition that requires the device to be reloaded manually. This vulnerability affects: Cisco Catalyst 4500 Switches with Supervisor Engine 8-E, if they are running Cisco IOS XE Software Release 3.x.x.E and IP multicast routing is configured; Cisco devices that are running Cisco IOS XE Software Release 16.x, if IP multicast routing is configured. Cisco Bug IDs: CSCuw09295, CSCve94496.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios Xe | 15.2\(3\)e |
| Cisco | Catalyst 4000 | - |
| Cisco | Catalyst 3850-12S-E | - |
| Cisco | Catalyst 3850-12S-S | - |
| Cisco | Catalyst 3850-12Xs-E | - |
| Cisco | Catalyst 3850-12Xs-S | - |
| Cisco | Catalyst 3850-16Xs-E | - |
| Cisco | Catalyst 3850-16Xs-S | - |
| Cisco | Catalyst 3850-24P-E | - |
| Cisco | Catalyst 3850-24P-L | - |
| Cisco | Catalyst 3850-24P-S | - |
| Cisco | Catalyst 3850-24Pw-S | - |
| Cisco | Catalyst 3850-24S-E | - |
| Cisco | Catalyst 3850-24S-S | - |
| Cisco | Catalyst 3850-24T-E | - |
| Cisco | Catalyst 3850-24T-L | - |
| Cisco | Catalyst 3850-24T-S | - |
| Cisco | Catalyst 3850-24U-E | - |
| Cisco | Catalyst 3850-24U-L | - |
| Cisco | Catalyst 3850-24U-S | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103568Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040592Third Party AdvisoryVDB Entry
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
- http://www.securityfocus.com/bid/103568Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040592Third Party AdvisoryVDB Entry
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
FAQ
What is CVE-2018-0165?
CVE-2018-0165 is a vulnerability with a CVSS score of 7.4 (HIGH). A vulnerability in the Internet Group Management Protocol (IGMP) packet-processing functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust buffers on an aff...
How severe is CVE-2018-0165?
CVE-2018-0165 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-0165?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios Xe, Cisco Catalyst 4000, Cisco Catalyst 3850-12S-E, Cisco Catalyst 3850-12S-S, Cisco Catalyst 3850-12Xs-E.