ID

VAR-201405-0356


CVE

CVE-2014-3261


TITLE

Cisco Multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2014-03244 // BID: 67575

DESCRIPTION

Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322

Trust: 2.52

sources: NVD: CVE-2014-3261 // JVNDB: JVNDB-2014-002654 // CNVD: CNVD-2014-03244 // BID: 67575 // VULHUB: VHN-71201

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-03244

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(2c\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(2a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u3\(1\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u3\(2a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u3\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(2b\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u3\(2b\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1e\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(2d\)

Trust: 1.6

vendor:ciscomodel:nx-osscope: - version: -

Trust: 1.4

vendor:ciscomodel:nexus 5020p switchscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:cgr 1120scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:cg-osscope:eqversion:cg4\(1\)

Trust: 1.0

vendor:ciscomodel:nexus 3064tscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3\)

Trust: 1.0

vendor:ciscomodel:unified computing system 6120xp fabric interconnectscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:cg-osscope:eqversion:cg4

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:nexus 7000 9-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1\)

Trust: 1.0

vendor:ciscomodel:nexus 5000scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:unified computing system 6296up fabric interconnectscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:unified computing system 6140xp fabric interconnectscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(2\)

Trust: 1.0

vendor:ciscomodel:nexus 5020scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nexus 3048scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 4001iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1d\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(1d\)

Trust: 1.0

vendor:ciscomodel:nexus 5010p switchscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 3016qscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 3064xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 5010scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nexus 7000 10-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:unified computing system infrastructure and unified computing system softwarescope:eqversion:1.4\(1j\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)

Trust: 1.0

vendor:ciscomodel:unified computing system 6248up fabric interconnectscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 1.0

vendor:ciscomodel:nexus 5548upscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(1b\)

Trust: 1.0

vendor:ciscomodel:nexus 5548pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 1.0

vendor:ciscomodel:nexus 5596upscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:cgr 1240scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u5\(1c\)

Trust: 1.0

vendor:ciscomodel:nexus 3548scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u4\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nexus 7000scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nexus 7000 18-slotscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:nexus 5548up switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5010p switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5596up switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5010p switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5020 switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5548p switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5020 switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5020p switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5000 series switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5020p switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5548p switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5000 series switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5010 switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5010 switchscope:ltversion:5.x

Trust: 0.8

vendor:ciscomodel:nexus 5596up switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nexus 5548up switchscope:eqversion:software 5.1(3)n1(1)

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.2(4)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2(3)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2(6)

Trust: 0.6

vendor:ciscomodel:unified computing system fabric interconnectsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nx-os ucsscope:eqversion:62000

Trust: 0.3

vendor:ciscomodel:nx-os ucsscope:eqversion:61000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:40000

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os mdsscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:40000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os cgrscope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:connected grid router series cg-osscope:eqversion:1000

Trust: 0.3

vendor:ciscomodel:nx-os ucs 2.2scope:neversion:6200

Trust: 0.3

vendor:ciscomodel:nx-os ucs 2.2scope:neversion:6100

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:neversion:70006.2(8)

Trust: 0.3

vendor:ciscomodel:nx-os nexus 7.0 n1scope:neversion:5000

Trust: 0.3

vendor:ciscomodel:nx-os nexus 6.0 n2scope:neversion:5000

Trust: 0.3

vendor:ciscomodel:nx-os nexus 5.2 n1scope:neversion:5000

Trust: 0.3

vendor:ciscomodel:nx-os nexus 4.1 e1scope:neversion:4000

Trust: 0.3

vendor:ciscomodel:nx-os nexus 6.0 u2scope:neversion:3000

Trust: 0.3

vendor:ciscomodel:nx-os nexus 5.0 u5scope:neversion:3000

Trust: 0.3

vendor:ciscomodel:nx-os mdsscope:neversion:90006.2(7)

Trust: 0.3

vendor:ciscomodel:nx-os cgr cg4scope:neversion:1000

Trust: 0.3

vendor:ciscomodel:nx-os cgr 15.4 cgscope:neversion:1000

Trust: 0.3

sources: CNVD: CNVD-2014-03244 // BID: 67575 // JVNDB: JVNDB-2014-002654 // CNNVD: CNNVD-201405-482 // NVD: CVE-2014-3261

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3261
value: HIGH

Trust: 1.0

NVD: CVE-2014-3261
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-03244
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201405-482
value: HIGH

Trust: 0.6

VULHUB: VHN-71201
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3261
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-03244
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71201
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-03244 // VULHUB: VHN-71201 // JVNDB: JVNDB-2014-002654 // CNNVD: CNNVD-201405-482 // NVD: CVE-2014-3261

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-71201 // JVNDB: JVNDB-2014-002654 // NVD: CVE-2014-3261

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-482

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201405-482

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002654

PATCH

title:cisco-sa-20140521-nxosurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos

Trust: 0.8

title:34247url:http://tools.cisco.com/security/center/viewAlert.x?alertId=34247

Trust: 0.8

title:cisco-sa-20140521-nxosurl:http://www.cisco.com/cisco/web/support/JP/112/1122/1122585_cisco-sa-20140521-nxos-j.html

Trust: 0.8

title:Patch for multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/45867

Trust: 0.6

sources: CNVD: CNVD-2014-03244 // JVNDB: JVNDB-2014-002654

EXTERNAL IDS

db:NVDid:CVE-2014-3261

Trust: 3.4

db:BIDid:67575

Trust: 1.0

db:JVNDBid:JVNDB-2014-002654

Trust: 0.8

db:CNNVDid:CNNVD-201405-482

Trust: 0.7

db:CNVDid:CNVD-2014-03244

Trust: 0.6

db:CISCOid:20140521 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS

Trust: 0.6

db:VULHUBid:VHN-71201

Trust: 0.1

sources: CNVD: CNVD-2014-03244 // VULHUB: VHN-71201 // BID: 67575 // JVNDB: JVNDB-2014-002654 // CNNVD: CNNVD-201405-482 // NVD: CVE-2014-3261

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140521-nxos

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3261

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3261

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/ps9494/products_sub_category_home.html

Trust: 0.3

sources: CNVD: CNVD-2014-03244 // VULHUB: VHN-71201 // BID: 67575 // JVNDB: JVNDB-2014-002654 // CNNVD: CNNVD-201405-482 // NVD: CVE-2014-3261

CREDITS

Cisco

Trust: 0.3

sources: BID: 67575

SOURCES

db:CNVDid:CNVD-2014-03244
db:VULHUBid:VHN-71201
db:BIDid:67575
db:JVNDBid:JVNDB-2014-002654
db:CNNVDid:CNNVD-201405-482
db:NVDid:CVE-2014-3261

LAST UPDATE DATE

2024-11-23T22:02:10.889000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-03244date:2014-05-26T00:00:00
db:VULHUBid:VHN-71201date:2018-10-30T00:00:00
db:BIDid:67575date:2014-05-21T00:00:00
db:JVNDBid:JVNDB-2014-002654date:2014-05-28T00:00:00
db:CNNVDid:CNNVD-201405-482date:2014-05-28T00:00:00
db:NVDid:CVE-2014-3261date:2024-11-21T02:07:44.867

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-03244date:2014-05-26T00:00:00
db:VULHUBid:VHN-71201date:2014-05-26T00:00:00
db:BIDid:67575date:2014-05-21T00:00:00
db:JVNDBid:JVNDB-2014-002654date:2014-05-28T00:00:00
db:CNNVDid:CNNVD-201405-482date:2014-05-28T00:00:00
db:NVDid:CVE-2014-3261date:2014-05-26T00:25:32.220