ID

VAR-201603-0329


CVE

CVE-2015-0718


TITLE

plural Cisco Nexus Device and Unified Computing System Run on Cisco NX-OS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-006993

DESCRIPTION

Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579. Cisco NX-OS is a data center level operating system. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service on the affected device. The following products are affected: Cisco Nexus 1000V Series Switches, Nexus 3000 Series Switches, Nexus 4000 Series Switches, Nexus 5000 Series Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Unified Computing CSuting running NX-OS Software)

Trust: 2.25

sources: NVD: CVE-2015-0718 // JVNDB: JVNDB-2015-006993 // CNVD: CNVD-2016-01460 // VULHUB: VHN-78664

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01460

AFFECTED PRODUCTS

vendor:sunmodel:opensolarisscope:eqversion:snv_124

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:base

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4k

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_1e

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3u

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_4b

Trust: 1.0

vendor:zyxelmodel:gs1900-10hpscope:ltversion:2.50\(aazi.0\)c0

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4j

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4l

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3q

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5b

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_1d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3m

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_1e

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_2d

Trust: 1.0

vendor:netgearmodel:jr6150scope:ltversion:2017-01-06

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.6_base

Trust: 1.0

vendor:samsungmodel:x14jscope:eqversion:t-ms14jakucb-1102.5

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_1c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3f

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_1i

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3l

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3y

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_3c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_1b

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_2r

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_1w

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4i

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4f

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_4a

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3s

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3e

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_1t

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_1j

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_1m

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.5_base

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_1b

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_4g

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5e

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5f

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5a

Trust: 1.0

vendor:zzincmodel:keymousescope:eqversion:3.08

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_2m

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_2d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3a

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_1x

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_1q

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_2e

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_5d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_3b

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_4d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_1f

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_2c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_3a

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_1d

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_1a

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.2_2c

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_3b

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_2q

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.0_1s

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4_3i

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:2.1_2a

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.0 to 6.1

Trust: 0.8

vendor:ciscomodel:unified computing systemscope:eqversion:(ucs)

Trust: 0.8

vendor:ciscomodel:nexus series switchesscope:eqversion:1000v

Trust: 0.6

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:4000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\\\(3\\\)u5\\\(1c\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\\\(3\\\)u5\\\(1h\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\\\(3\\\)u5\\\(1a\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\\\(1\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.1\\\(2\\\)e1\\\(1d\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\\\(3\\\)u5\\\(1b\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\\\(5\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\\\(3\\\)u5\\\(1d\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.1\\\(2\\\)e1\\\(1b\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\\\(7\\\)

Trust: 0.6

sources: CNVD: CNVD-2016-01460 // JVNDB: JVNDB-2015-006993 // CNNVD: CNNVD-201603-009 // NVD: CVE-2015-0718

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0718
value: HIGH

Trust: 1.0

NVD: CVE-2015-0718
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01460
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201603-009
value: HIGH

Trust: 0.6

VULHUB: VHN-78664
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0718
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01460
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78664
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-0718
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01460 // VULHUB: VHN-78664 // JVNDB: JVNDB-2015-006993 // CNNVD: CNNVD-201603-009 // NVD: CVE-2015-0718

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78664 // JVNDB: JVNDB-2015-006993 // NVD: CVE-2015-0718

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-009

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201603-009

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006993

PATCH

title:cisco-sa-20160302-netstackurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack

Trust: 0.8

title:Patch for Cisco NX-OSSoftware Denial of Service Vulnerability (CNVD-2016-01460)url:https://www.cnvd.org.cn/patchInfo/show/72208

Trust: 0.6

title:Cisco NX-OS Software TCP Fix for stack denial of service vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60374

Trust: 0.6

sources: CNVD: CNVD-2016-01460 // JVNDB: JVNDB-2015-006993 // CNNVD: CNNVD-201603-009

EXTERNAL IDS

db:NVDid:CVE-2015-0718

Trust: 3.1

db:SECTRACKid:1035159

Trust: 1.1

db:SECTRACKid:1035160

Trust: 1.1

db:JVNDBid:JVNDB-2015-006993

Trust: 0.8

db:CNNVDid:CNNVD-201603-009

Trust: 0.7

db:CNVDid:CNVD-2016-01460

Trust: 0.6

db:BIDid:83950

Trust: 0.1

db:VULHUBid:VHN-78664

Trust: 0.1

sources: CNVD: CNVD-2016-01460 // VULHUB: VHN-78664 // JVNDB: JVNDB-2015-006993 // CNNVD: CNNVD-201603-009 // NVD: CVE-2015-0718

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160302-netstack

Trust: 2.3

url:http://www.securitytracker.com/id/1035159

Trust: 1.1

url:http://www.securitytracker.com/id/1035160

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0718

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0718

Trust: 0.8

sources: CNVD: CNVD-2016-01460 // VULHUB: VHN-78664 // JVNDB: JVNDB-2015-006993 // CNNVD: CNNVD-201603-009 // NVD: CVE-2015-0718

SOURCES

db:CNVDid:CNVD-2016-01460
db:VULHUBid:VHN-78664
db:JVNDBid:JVNDB-2015-006993
db:CNNVDid:CNNVD-201603-009
db:NVDid:CVE-2015-0718

LAST UPDATE DATE

2024-11-23T22:31:00.088000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01460date:2016-03-08T00:00:00
db:VULHUBid:VHN-78664date:2016-12-03T00:00:00
db:JVNDBid:JVNDB-2015-006993date:2016-03-18T00:00:00
db:CNNVDid:CNNVD-201603-009date:2016-03-03T00:00:00
db:NVDid:CVE-2015-0718date:2024-11-21T02:23:35.747

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01460date:2016-03-07T00:00:00
db:VULHUBid:VHN-78664date:2016-03-03T00:00:00
db:JVNDBid:JVNDB-2015-006993date:2016-03-18T00:00:00
db:CNNVDid:CNNVD-201603-009date:2016-03-03T00:00:00
db:NVDid:CVE-2015-0718date:2016-03-03T22:59:02.707