ID

VAR-201506-0167


CVE

CVE-2015-0775


TITLE

plural Cisco Run on device Cisco NX-OS Service disruption in the implementation of banners (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-003075

DESCRIPTION

The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182. plural Cisco Run on device Cisco NX-OS Banner ( alias MOTD) Implementation of service disruption ( Reset the login process ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCuo10554 , CSCuu75466 , CSCuu75471 , CSCuu75484 , CSCuu75498 , CSCuu77170 ,and CSCuu77182 It is released as.By a third party TELNET Denial of service via unspecified terminal session request during session setup ( Reset the login process ) There is a possibility of being put into a state. A security hole exists in the banner implementation of Cisco Nexus and MDS's Cisco NX-OS. Cisco Nexus and Multilayer Director Switches are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial of service condition, denying service to legitimate users. This issue is being tracked by Cisco bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77182, and CSCuu77170

Trust: 2.52

sources: NVD: CVE-2015-0775 // JVNDB: JVNDB-2015-003075 // CNVD: CNVD-2015-03886 // BID: 75131 // VULHUB: VHN-78721

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03886

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(2\)

Trust: 1.6

vendor:ciscomodel:mds 9000 nx-osscope:eqversion:6.2\(11\)

Trust: 1.6

vendor:ciscomodel:nexus 1000vscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(12\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.1\(2\)e1\(1f\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:7.2\(0\)zn\(99.67\)

Trust: 1.6

vendor:ciscomodel:mds nx-os softwarescope:eqversion:90006.2(11)

Trust: 0.9

vendor:ciscomodel:mds 9000 nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 1000v switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3016 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3048 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3064 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 31128pq switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3132q switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3164q switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3172 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3232c switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3264q switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3524 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 3548 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 4001i switch module for ibm bladecenterscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 7000 series switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 7700 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 93120tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 93128tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9332pq switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9336pq aci spini switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9372px switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9372tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9396px switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9396tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9504 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9508 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9516 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.1(2)e1(1f) (nexus 4000 series switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:5.2(1)sv3(2.1) (nexus 1000v switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.0(2)n2(2) (nexus 5000 series switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.2(11) (mds 9000 series switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.2(12) (nexus 7000 series switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:7.0(3) (nexus 9000 series switch )

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:7.2(0)zn(99.67) (nexus 3000 series switch )

Trust: 0.8

vendor:ciscomodel:nexus switch 5.2 sv3 basescope:eqversion:1000v

Trust: 0.6

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:90007.0(3)

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:70006.2(12)

Trust: 0.3

vendor:ciscomodel:nx-os for nexus series 6.0 n2scope:eqversion:5000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus series 4.1 e1scope:eqversion:4000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus series 7.2 znscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:nexus switch 5.2 sv3scope:eqversion:1000v

Trust: 0.3

sources: CNVD: CNVD-2015-03886 // BID: 75131 // JVNDB: JVNDB-2015-003075 // CNNVD: CNNVD-201506-240 // NVD: CVE-2015-0775

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0775
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0775
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-03886
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201506-240
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78721
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0775
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03886
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78721
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03886 // VULHUB: VHN-78721 // JVNDB: JVNDB-2015-003075 // CNNVD: CNNVD-201506-240 // NVD: CVE-2015-0775

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78721 // JVNDB: JVNDB-2015-003075 // NVD: CVE-2015-0775

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201506-240

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201506-240

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003075

PATCH

title:39280url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39280

Trust: 0.8

title:Patch for Cisco Nexus and MDS NX-OS Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/59748

Trust: 0.6

sources: CNVD: CNVD-2015-03886 // JVNDB: JVNDB-2015-003075

EXTERNAL IDS

db:NVDid:CVE-2015-0775

Trust: 3.4

db:SECTRACKid:1032561

Trust: 1.1

db:SECTRACKid:1032562

Trust: 1.1

db:BIDid:75131

Trust: 1.0

db:JVNDBid:JVNDB-2015-003075

Trust: 0.8

db:CNNVDid:CNNVD-201506-240

Trust: 0.7

db:CNVDid:CNVD-2015-03886

Trust: 0.6

db:VULHUBid:VHN-78721

Trust: 0.1

sources: CNVD: CNVD-2015-03886 // VULHUB: VHN-78721 // BID: 75131 // JVNDB: JVNDB-2015-003075 // CNNVD: CNNVD-201506-240 // NVD: CVE-2015-0775

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39280

Trust: 2.6

url:http://www.securitytracker.com/id/1032561

Trust: 1.1

url:http://www.securitytracker.com/id/1032562

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0775

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0775

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-03886 // VULHUB: VHN-78721 // BID: 75131 // JVNDB: JVNDB-2015-003075 // CNNVD: CNNVD-201506-240 // NVD: CVE-2015-0775

CREDITS

Cisco

Trust: 0.3

sources: BID: 75131

SOURCES

db:CNVDid:CNVD-2015-03886
db:VULHUBid:VHN-78721
db:BIDid:75131
db:JVNDBid:JVNDB-2015-003075
db:CNNVDid:CNNVD-201506-240
db:NVDid:CVE-2015-0775

LAST UPDATE DATE

2024-11-23T21:54:57.873000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03886date:2015-06-19T00:00:00
db:VULHUBid:VHN-78721date:2017-01-04T00:00:00
db:BIDid:75131date:2015-06-10T00:00:00
db:JVNDBid:JVNDB-2015-003075date:2015-06-16T00:00:00
db:CNNVDid:CNNVD-201506-240date:2015-06-18T00:00:00
db:NVDid:CVE-2015-0775date:2024-11-21T02:23:41.770

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03886date:2015-06-19T00:00:00
db:VULHUBid:VHN-78721date:2015-06-12T00:00:00
db:BIDid:75131date:2015-06-10T00:00:00
db:JVNDBid:JVNDB-2015-003075date:2015-06-16T00:00:00
db:CNNVDid:CNNVD-201506-240date:2015-06-15T00:00:00
db:NVDid:CVE-2015-0775date:2015-06-12T14:59:02.770