ID

VAR-201610-0338


CVE

CVE-2016-1453


TITLE

Cisco Nexus 7000 and 7700 Run on device Cisco NX-OS of Overlay Transport Virtualization GRE Buffer overflow vulnerability in function

Trust: 0.8

sources: JVNDB: JVNDB-2016-005145

DESCRIPTION

Buffer overflow in the Overlay Transport Virtualization (OTV) GRE feature in Cisco NX-OS 5.0 through 7.3 on Nexus 7000 and 7700 devices allows remote attackers to execute arbitrary code via long parameters in a packet header, aka Bug ID CSCuy95701. The Cisco Nexus 7000 Series Switches is a modular data center level product line. A security vulnerability exists in the OTVGRE implementation of the Cisco Nexus 7000/7700 Series Switches. A remote attacker could exploit the vulnerability to reload an affected system or execute arbitrary code remotely. This issue being tracked by Cisco Bug ID CSCuy95701

Trust: 2.61

sources: NVD: CVE-2016-1453 // JVNDB: JVNDB-2016-005145 // CNVD: CNVD-2016-08613 // BID: 93409 // VULHUB: VHN-90272 // VULMON: CVE-2016-1453

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-08613

AFFECTED PRODUCTS

vendor:ciscomodel:nx-os 5.2 n1scope: - version: -

Trust: 3.6

vendor:ciscomodel:nx-os 4.2scope: - version: -

Trust: 2.4

vendor:ciscomodel:nx-os 4.0 sv1scope: - version: -

Trust: 2.1

vendor:ciscomodel:nx-os 5.0 u5scope: - version: -

Trust: 1.8

vendor:ciscomodel:nx-os 5.0 u1scope: - version: -

Trust: 1.8

vendor:ciscomodel:nx-os 6.0 n2scope: - version: -

Trust: 1.8

vendor:ciscomodel:nx-os 5.0 n2scope: - version: -

Trust: 1.8

vendor:ciscomodel:nx-os 5.0 u2scope: - version: -

Trust: 1.8

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(12\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(10\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(7\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:base

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(14\)s1

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.6

vendor:ciscomodel:nx-os 5.2scope: - version: -

Trust: 1.5

vendor:ciscomodel:nx-os 5.0scope: - version: -

Trust: 1.5

vendor:ciscomodel:nx-os 4.0 n1scope: - version: -

Trust: 1.5

vendor:ciscomodel:nx-os 5.0 n1scope: - version: -

Trust: 1.5

vendor:ciscomodel:nx-os n1scope:eqversion:4.0

Trust: 1.5

vendor:ciscomodel:nx-os 5.0 u3scope: - version: -

Trust: 1.2

vendor:ciscomodel:nx-os 6.2scope: - version: -

Trust: 1.2

vendor:ciscomodel:nx-os 5.1 n2scope: - version: -

Trust: 1.2

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(9\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.2\(0\)n1\(0.1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-os 4.2 sv1scope: - version: -

Trust: 0.9

vendor:ciscomodel:nx-os 4.1 n2scope: - version: -

Trust: 0.9

vendor:ciscomodel:nx-os 4.1scope: - version: -

Trust: 0.9

vendor:ciscomodel:nx-osscope:eqversion:5.0 to 7.3

Trust: 0.8

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nx-os 4.1 n1scope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-os n1scope:eqversion:4.1

Trust: 0.6

vendor:ciscomodel:nx-os 5.1 n1scope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-os 6.0 n1scope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-os 4.2 n2scope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0

Trust: 0.6

vendor:ciscomodel:nx-os 4.0 n2scope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(12)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0.5

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1.(4)

Trust: 0.3

vendor:ciscomodel:nx-os 4.2.scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(1)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(6)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1.(2)

Trust: 0.3

vendor:ciscomodel:nx-os 7.3 dxscope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:nx-os 5.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(2)

Trust: 0.3

vendor:ciscomodel:nx-os 6.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:nx-os s0scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:nx-os 6.2 s27scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1.(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(6)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(7)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(8)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:nx-os 3.0bscope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.0(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(0.54)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:nx-os 3.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nx-os 7.2 d1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 4.1 e1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(8)

Trust: 0.3

vendor:ciscomodel:nx-os 7.3 d1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:nx-os 5.0 u4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1(4)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:nx-os n2scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2(7)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:nx-os 4.2 n1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(3)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2(8)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.0(2)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.1.(5)

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:4.2.8

Trust: 0.3

vendor:ciscomodel:nx-os 2.1bscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2016-08613 // BID: 93409 // JVNDB: JVNDB-2016-005145 // CNNVD: CNNVD-201610-087 // NVD: CVE-2016-1453

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1453
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-1453
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2016-08613
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-087
value: CRITICAL

Trust: 0.6

VULHUB: VHN-90272
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1453
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1453
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-08613
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90272
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1453
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2016-1453
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-08613 // VULHUB: VHN-90272 // VULMON: CVE-2016-1453 // JVNDB: JVNDB-2016-005145 // CNNVD: CNNVD-201610-087 // NVD: CVE-2016-1453

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-90272 // JVNDB: JVNDB-2016-005145 // NVD: CVE-2016-1453

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-087

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201610-087

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005145

PATCH

title:cisco-sa-20161005-otvurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv

Trust: 0.8

title:Patch for CiscoNexus7000/7700OTV Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/82165

Trust: 0.6

title:Cisco NX-OS Buffer Overflow Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64515

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-08613 // VULMON: CVE-2016-1453 // JVNDB: JVNDB-2016-005145 // CNNVD: CNNVD-201610-087

EXTERNAL IDS

db:NVDid:CVE-2016-1453

Trust: 3.5

db:BIDid:93409

Trust: 2.7

db:SECTRACKid:1036946

Trust: 1.8

db:JVNDBid:JVNDB-2016-005145

Trust: 0.8

db:CNNVDid:CNNVD-201610-087

Trust: 0.7

db:CNVDid:CNVD-2016-08613

Trust: 0.6

db:VULHUBid:VHN-90272

Trust: 0.1

db:VULMONid:CVE-2016-1453

Trust: 0.1

sources: CNVD: CNVD-2016-08613 // VULHUB: VHN-90272 // VULMON: CVE-2016-1453 // BID: 93409 // JVNDB: JVNDB-2016-005145 // CNNVD: CNNVD-201610-087 // NVD: CVE-2016-1453

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161005-otv

Trust: 2.7

url:http://www.securityfocus.com/bid/93409

Trust: 1.9

url:http://www.securitytracker.com/id/1036946

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1453

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1453

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-08613 // VULHUB: VHN-90272 // VULMON: CVE-2016-1453 // BID: 93409 // JVNDB: JVNDB-2016-005145 // CNNVD: CNNVD-201610-087 // NVD: CVE-2016-1453

CREDITS

Cisco

Trust: 0.3

sources: BID: 93409

SOURCES

db:CNVDid:CNVD-2016-08613
db:VULHUBid:VHN-90272
db:VULMONid:CVE-2016-1453
db:BIDid:93409
db:JVNDBid:JVNDB-2016-005145
db:CNNVDid:CNNVD-201610-087
db:NVDid:CVE-2016-1453

LAST UPDATE DATE

2024-11-23T23:05:34.659000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-08613date:2016-10-11T00:00:00
db:VULHUBid:VHN-90272date:2017-07-30T00:00:00
db:VULMONid:CVE-2016-1453date:2017-07-30T00:00:00
db:BIDid:93409date:2016-10-10T04:02:00
db:JVNDBid:JVNDB-2016-005145date:2016-10-13T00:00:00
db:CNNVDid:CNNVD-201610-087date:2022-04-06T00:00:00
db:NVDid:CVE-2016-1453date:2024-11-21T02:46:28.293

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-08613date:2016-10-11T00:00:00
db:VULHUBid:VHN-90272date:2016-10-06T00:00:00
db:VULMONid:CVE-2016-1453date:2016-10-06T00:00:00
db:BIDid:93409date:2016-10-05T00:00:00
db:JVNDBid:JVNDB-2016-005145date:2016-10-13T00:00:00
db:CNNVDid:CNNVD-201610-087date:2016-10-11T00:00:00
db:NVDid:CVE-2016-1453date:2016-10-06T10:59:02.693