cvelist/2020/15xxx/CVE-2020-15383.json
2021-08-19 10:00:52 +00:00

67 lines
2.3 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-15383",
"ASSIGNER": "sirt@brocade.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Brocade Fabric OS",
"version": {
"version_data": [
{
"version_value": "Brocade Fabric OS versions before v9.0.0, v8.2.2d, and v8.2.1e"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denail of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1496",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1496"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210819-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210819-0002/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric OS v9.0.0, v8.2.2d and v8.2.1e to consume all memory leading to denial of service impacts possibly including a switch panic."
}
]
}
}