ID

VAR-201304-0263


CVE

CVE-2013-1180


TITLE

Nexus 7000 and MDS 9000 Runs on the device Cisco NX-OS Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2013-002470

DESCRIPTION

Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822. Nexus 7000 and MDS 9000 Runs on the device Cisco NX-OS of SNMP There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability CSCtx54822 It is released as.Crafted by remotely authenticated users SNMP Arbitrary code may be executed via a request. The Cisco MDS 9000 is a family of multi-layer intelligent optical channel switches from Cisco. Cisco Nexus is a data center-class switch from Cisco. SNMP is disabled by default and requires administrator configuration before it can be used. Since SNMP is mainly based on the UDP protocol, it can be utilized without completing the TCP three-way handshake, and the attack can be performed by forging the source. The attacker needs to know the public strings of SNMP V1 and V1 to exploit this vulnerability. An SNMP V3 device is configured. The attacker needs a valid username and password for use. Multiple Cisco NX-OS-Based products are prone to a buffer-overflow vulnerability. This issue is being tracked by Cisco Bug ID CSCtx54822. Attackers can exploit this issue to execute arbitrary code with elevated privileges. Failed exploit attempts will result in denial-of-service conditions

Trust: 2.52

sources: NVD: CVE-2013-1180 // JVNDB: JVNDB-2013-002470 // CNVD: CNVD-2013-04369 // BID: 59456 // VULHUB: VHN-61182

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-04369

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:5.1

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3d\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:nexus 7000scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 7000 9-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 18-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(5.1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 10-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:mds 9000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 series switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.x ( cisco nexus 7000 series

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:cisco mds 9000 series )

Trust: 0.8

vendor:ciscomodel:nexus 7000 9 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 7000 10 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:mds 9000 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:5.2(5)

Trust: 0.8

vendor:ciscomodel:nexus 7000 18 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.1(1)

Trust: 0.8

vendor:ciscomodel:nx-osscope:ltversion:5.x ( cisco nexus 7000 series

Trust: 0.8

vendor:ciscomodel:nx-osscope:ltversion:6.x ( cisco nexus 7000 series )

Trust: 0.8

vendor:ciscomodel:mdsscope:eqversion:9000

Trust: 0.6

sources: CNVD: CNVD-2013-04369 // JVNDB: JVNDB-2013-002470 // CNNVD: CNNVD-201304-535 // NVD: CVE-2013-1180

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1180
value: HIGH

Trust: 1.0

NVD: CVE-2013-1180
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-04369
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201304-535
value: CRITICAL

Trust: 0.6

VULHUB: VHN-61182
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1180
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-04369
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-61182
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-04369 // VULHUB: VHN-61182 // JVNDB: JVNDB-2013-002470 // CNNVD: CNNVD-201304-535 // NVD: CVE-2013-1180

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-61182 // JVNDB: JVNDB-2013-002470 // NVD: CVE-2013-1180

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-535

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201304-535

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002470

PATCH

title:cisco-sa-20130424-nxosmultiurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

Trust: 0.8

title:29023url:http://tools.cisco.com/security/center/viewAlert.x?alertId=29023

Trust: 0.8

title:28737url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28737

Trust: 0.8

title:cisco-sa-20130424-nxosmultiurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117910_cisco-sa-20130424-nxosmulti-j.html

Trust: 0.8

title:Patch for multiple Cisco product SNMP buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/33672

Trust: 0.6

sources: CNVD: CNVD-2013-04369 // JVNDB: JVNDB-2013-002470

EXTERNAL IDS

db:NVDid:CVE-2013-1180

Trust: 3.4

db:BIDid:59456

Trust: 1.6

db:JVNDBid:JVNDB-2013-002470

Trust: 0.8

db:CNNVDid:CNNVD-201304-535

Trust: 0.7

db:CNVDid:CNVD-2013-04369

Trust: 0.6

db:CISCOid:20130424 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS

Trust: 0.6

db:SECUNIAid:53189

Trust: 0.6

db:VULHUBid:VHN-61182

Trust: 0.1

sources: CNVD: CNVD-2013-04369 // VULHUB: VHN-61182 // BID: 59456 // JVNDB: JVNDB-2013-002470 // CNNVD: CNNVD-201304-535 // NVD: CVE-2013-1180

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130424-nxosmulti

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1180

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1180

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=29023

Trust: 0.6

url:http://secunia.com/advisories/53189

Trust: 0.6

url:http://www.securityfocus.com/bid/59456

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2013-04369 // VULHUB: VHN-61182 // BID: 59456 // JVNDB: JVNDB-2013-002470 // CNNVD: CNNVD-201304-535 // NVD: CVE-2013-1180

CREDITS

Cisco

Trust: 0.9

sources: BID: 59456 // CNNVD: CNNVD-201304-535

SOURCES

db:CNVDid:CNVD-2013-04369
db:VULHUBid:VHN-61182
db:BIDid:59456
db:JVNDBid:JVNDB-2013-002470
db:CNNVDid:CNNVD-201304-535
db:NVDid:CVE-2013-1180

LAST UPDATE DATE

2024-11-23T22:39:05.549000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-04369date:2013-04-27T00:00:00
db:VULHUBid:VHN-61182date:2013-04-25T00:00:00
db:BIDid:59456date:2013-04-24T00:00:00
db:JVNDBid:JVNDB-2013-002470date:2013-04-26T00:00:00
db:CNNVDid:CNNVD-201304-535date:2013-04-26T00:00:00
db:NVDid:CVE-2013-1180date:2024-11-21T01:49:03.670

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-04369date:2013-04-27T00:00:00
db:VULHUBid:VHN-61182date:2013-04-25T00:00:00
db:BIDid:59456date:2013-04-24T00:00:00
db:JVNDBid:JVNDB-2013-002470date:2013-04-26T00:00:00
db:CNNVDid:CNNVD-201304-535date:2013-04-25T00:00:00
db:NVDid:CVE-2013-1180date:2013-04-25T10:55:01.640