2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-0718" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2016-03-03T22:59:02.707" ,
"lastModified" : "2016-12-03T03:02:55.883" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579."
} ,
{
"lang" : "es" ,
"value" : "Cisco NX-OS 4.0 hasta la versi\u00f3n 6.1 en dispositivos Nexus 1000V 3000, 4000, 5000, 6000 y 7000 y plataformas Unified Computing System (UCS) permite a atancantes remotos causar una denegaci\u00f3n de servicio (recarga de pila TCP) mediante el env\u00edo de paquetes TCP manipulados a un dispositivo que tenga una sesi\u00f3n TIME_WAIT TCP, tambi\u00e9n conocido como Bug ID CSCub70579."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.8
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB6F78F3-0C2E-4F0F-8D2E-31B67DB42472"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A80A2C90-5B7C-4EC1-80A9-729A0F06031E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65BC2A14-4A72-4758-BE17-CBF827569D86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D1909BD-03D2-4F27-9072-4EB8261F19AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B9195CA-1339-4893-B8A4-971F4B925349"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7D87DEE-2CEC-463F-835A-1974B4C4F1E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1628CE3-1493-4C35-941D-8C3AA1044467"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE970756-5E04-4FAE-8589-AC68AA52EC85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "781FF06A-3F99-4DC7-A79D-C8582E5C5FF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D3819FA-1AAE-48C6-9137-DACF35F820BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F5557821-D83E-4D39-8499-A1503EDA13E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "259FC572-CAC3-4AC7-847E-8DADF58F6244"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E99A5257-B675-43E8-AB96-9E8AE5C38770"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD515D92-4684-4C6A-B357-C0C1760332B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52C9D48E-69BE-437C-AEAA-8087E7BDE01A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6FB1056-A8C0-498A-94DB-CF3D6B4B1952"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9673825E-FA14-4E70-8B5C-A6978E78C2C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38CBE00C-943C-4370-9E94-18B2A59384FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45D47062-3D36-44B3-A03F-E716CA28E490"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8DCAE42A-01E0-4120-93B6-6C65C3CC5840"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "037BF8C3-352F-413F-81B3-F982979F1D76"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C9ED255-9107-4408-9594-9DAB32DEB793"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E6A1EF9-2AD6-4592-B9B2-68B7D31818EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "208A941A-6D38-4A87-BC9C-08533CC5A345"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "70287DD2-D08B-4651-B919-98132083955E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C509B7EC-3249-4F81-A84F-07A591A7607D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5ADB38CA-107C-4B25-A3F4-481BD40E2B13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1914FC5D-F732-45D1-B743-C001FC097C45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "05A47393-B4EC-4463-A3C8-18DA544180BB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FAC5FB0-D5A7-4C94-A3EA-945AE98BA06E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C875EC7-6B52-4CA8-9114-94B643C8B6CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ACF61A3E-628A-4B44-96B7-7FC287012A05"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5E85B5F-34DA-4AB8-B024-67356622753F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44454A17-1A9A-4C9B-8B3D-09B4FEA57EC7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A1433216-CD80-4592-88A9-F77609E6A2D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C864C5B-71C7-40F9-87E4-38C40B403062"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "700023BC-C599-48B8-9270-9F9FEF5226A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E95DC7AD-6FAB-452B-B28D-897B0A54A8A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C450C35-F3AE-4764-B526-C8AC72ACE23D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7163742C-2D4A-4B9A-A5F0-9EE7C0EDEECD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "936C4011-EA09-49D3-B691-0BA723B0A12A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34A654BC-1438-47B6-8003-8B26BCC5609D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "15FCBDCA-F7AF-4AB7-9969-03C4B54708CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B636D4C-EEE2-4DE2-A0BE-D027F2685596"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB26588E-4BDE-404B-B260-97409CBA5484"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9E36183-43A7-4F1E-AA0F-6B4F7DC508A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83BE0150-A046-4471-A8DC-84B452D48E23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "291162BE-4233-4BA5-B8B0-6AF52D2D82F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A806750-804B-4B95-A627-6FE9F438502F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDAEBA25-BA6E-4E5C-8602-1AFD5211148B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D3447A9-A5F4-4B5C-A9EE-512EBD902AC6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E222E1CA-7A13-42BC-ADC7-C2435A7111D8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC205C79-0841-4AB3-8DAE-D01813615DF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97261FA3-E148-430A-B019-1CC2D8C3732F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50D20009-880B-470E-84DF-20E8A0795E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E15905A8-2BC7-4A5D-8C93-9FC703F0B705"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6A3BEF89-20FC-4BB6-B1BC-3795235ED998"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E8BBA0E-5CD3-4F83-B664-8C235548A233"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB74768A-D3C9-4D47-8F3E-850855EBB5D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFBAD221-BBD3-4BE6-974F-361C8E0FC6E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2017-01-06" ,
"matchCriteriaId" : "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A5867B4-EC19-45D4-87BE-867E1D41ECD5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*" ,
"matchCriteriaId" : "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.50\\(aazi.0\\)c0" ,
"matchCriteriaId" : "21D9999F-C55E-4BAB-A401-007FB34B2A5E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*" ,
"matchCriteriaId" : "83223AC7-22F3-4FCA-B11B-B769086DCF04"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1035159" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.securitytracker.com/id/1035160" ,
"source" : "ykramarz@cisco.com"
}
]
}