ID

VAR-201304-0278


CVE

CVE-2013-1179


TITLE

Nexus 7000 and MDS 9000 Runs on the device Cisco NX-OS Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2013-002469

DESCRIPTION

Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830. Nexus 7000 and MDS 9000 Runs on the device Cisco NX-OS of (1) SNMP and (2) License Manager There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability CSCtx54830 It is released as.Crafted by remotely authenticated users SNMP Arbitrary code may be executed via a request. Multiple Cisco NX-OS-Based products are prone to a buffer-overflow vulnerability. This issue is being tracked by Cisco Bug ID CSCtx54830. Attackers can exploit this issue to execute arbitrary code with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. Cisco NX-OS is a data center-oriented operating system developed by Cisco

Trust: 1.98

sources: NVD: CVE-2013-1179 // JVNDB: JVNDB-2013-002469 // BID: 59454 // VULHUB: VHN-61181

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(1\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(5.1\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3c\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3b\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3d\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:nexus 7000scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 7000 9-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 18-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(1a\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 10-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:mds 9000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0\(0\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 series switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.x ( cisco nexus 7000 series

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:cisco mds 9000 series )

Trust: 0.8

vendor:ciscomodel:nexus 7000 9 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 7000 10 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:mds 9000 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:5.2(5)

Trust: 0.8

vendor:ciscomodel:nexus 7000 18 slot switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.1(1)

Trust: 0.8

vendor:ciscomodel:nx-osscope:ltversion:5.x ( cisco nexus 7000 series

Trust: 0.8

vendor:ciscomodel:nx-osscope:ltversion:6.x ( cisco nexus 7000 series )

Trust: 0.8

sources: JVNDB: JVNDB-2013-002469 // CNNVD: CNNVD-201304-527 // NVD: CVE-2013-1179

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1179
value: HIGH

Trust: 1.0

NVD: CVE-2013-1179
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201304-527
value: CRITICAL

Trust: 0.6

VULHUB: VHN-61181
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1179
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61181
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61181 // JVNDB: JVNDB-2013-002469 // CNNVD: CNNVD-201304-527 // NVD: CVE-2013-1179

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-61181 // JVNDB: JVNDB-2013-002469 // NVD: CVE-2013-1179

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-527

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201304-527

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002469

PATCH

title:cisco-sa-20130424-nxosmultiurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

Trust: 0.8

title:29022url:http://tools.cisco.com/security/center/viewAlert.x?alertId=29022

Trust: 0.8

title:28737url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28737

Trust: 0.8

title:cisco-sa-20130424-nxosmultiurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117910_cisco-sa-20130424-nxosmulti-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-002469

EXTERNAL IDS

db:NVDid:CVE-2013-1179

Trust: 2.8

db:BIDid:59454

Trust: 1.0

db:JVNDBid:JVNDB-2013-002469

Trust: 0.8

db:CNNVDid:CNNVD-201304-527

Trust: 0.7

db:CISCOid:20130424 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS

Trust: 0.6

db:SECUNIAid:53189

Trust: 0.6

db:VULHUBid:VHN-61181

Trust: 0.1

sources: VULHUB: VHN-61181 // BID: 59454 // JVNDB: JVNDB-2013-002469 // CNNVD: CNNVD-201304-527 // NVD: CVE-2013-1179

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130424-nxosmulti

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1179

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1179

Trust: 0.8

url:http://secunia.com/advisories/53189

Trust: 0.6

url:http://www.securityfocus.com/bid/59454

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-61181 // BID: 59454 // JVNDB: JVNDB-2013-002469 // CNNVD: CNNVD-201304-527 // NVD: CVE-2013-1179

CREDITS

Cisco

Trust: 0.9

sources: BID: 59454 // CNNVD: CNNVD-201304-527

SOURCES

db:VULHUBid:VHN-61181
db:BIDid:59454
db:JVNDBid:JVNDB-2013-002469
db:CNNVDid:CNNVD-201304-527
db:NVDid:CVE-2013-1179

LAST UPDATE DATE

2024-11-23T22:39:05.481000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61181date:2013-04-29T00:00:00
db:BIDid:59454date:2013-04-24T00:00:00
db:JVNDBid:JVNDB-2013-002469date:2013-04-26T00:00:00
db:CNNVDid:CNNVD-201304-527date:2013-04-26T00:00:00
db:NVDid:CVE-2013-1179date:2024-11-21T01:49:03.523

SOURCES RELEASE DATE

db:VULHUBid:VHN-61181date:2013-04-25T00:00:00
db:BIDid:59454date:2013-04-24T00:00:00
db:JVNDBid:JVNDB-2013-002469date:2013-04-26T00:00:00
db:CNNVDid:CNNVD-201304-527date:2013-04-25T00:00:00
db:NVDid:CVE-2013-1179date:2013-04-25T10:55:01.617