mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
433 lines
18 KiB
JSON
433 lines
18 KiB
JSON
{
|
|
"id": "CVE-2015-0718",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2016-03-03T22:59:02.707",
|
|
"lastModified": "2016-12-03T03:02:55.883",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco NX-OS 4.0 hasta la versi\u00f3n 6.1 en dispositivos Nexus 1000V 3000, 4000, 5000, 6000 y 7000 y plataformas Unified Computing System (UCS) permite a atancantes remotos causar una denegaci\u00f3n de servicio (recarga de pila TCP) mediante el env\u00edo de paquetes TCP manipulados a un dispositivo que tenga una sesi\u00f3n TIME_WAIT TCP, tambi\u00e9n conocido como Bug ID CSCub70579."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB6F78F3-0C2E-4F0F-8D2E-31B67DB42472"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A80A2C90-5B7C-4EC1-80A9-729A0F06031E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65BC2A14-4A72-4758-BE17-CBF827569D86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D1909BD-03D2-4F27-9072-4EB8261F19AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B9195CA-1339-4893-B8A4-971F4B925349"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7D87DEE-2CEC-463F-835A-1974B4C4F1E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1628CE3-1493-4C35-941D-8C3AA1044467"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE970756-5E04-4FAE-8589-AC68AA52EC85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "781FF06A-3F99-4DC7-A79D-C8582E5C5FF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D3819FA-1AAE-48C6-9137-DACF35F820BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5557821-D83E-4D39-8499-A1503EDA13E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "259FC572-CAC3-4AC7-847E-8DADF58F6244"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E99A5257-B675-43E8-AB96-9E8AE5C38770"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD515D92-4684-4C6A-B357-C0C1760332B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52C9D48E-69BE-437C-AEAA-8087E7BDE01A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6FB1056-A8C0-498A-94DB-CF3D6B4B1952"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9673825E-FA14-4E70-8B5C-A6978E78C2C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38CBE00C-943C-4370-9E94-18B2A59384FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "45D47062-3D36-44B3-A03F-E716CA28E490"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DCAE42A-01E0-4120-93B6-6C65C3CC5840"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "037BF8C3-352F-413F-81B3-F982979F1D76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C9ED255-9107-4408-9594-9DAB32DEB793"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E6A1EF9-2AD6-4592-B9B2-68B7D31818EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "208A941A-6D38-4A87-BC9C-08533CC5A345"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70287DD2-D08B-4651-B919-98132083955E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C509B7EC-3249-4F81-A84F-07A591A7607D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5ADB38CA-107C-4B25-A3F4-481BD40E2B13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1914FC5D-F732-45D1-B743-C001FC097C45"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05A47393-B4EC-4463-A3C8-18DA544180BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FAC5FB0-D5A7-4C94-A3EA-945AE98BA06E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C875EC7-6B52-4CA8-9114-94B643C8B6CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACF61A3E-628A-4B44-96B7-7FC287012A05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5E85B5F-34DA-4AB8-B024-67356622753F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44454A17-1A9A-4C9B-8B3D-09B4FEA57EC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1433216-CD80-4592-88A9-F77609E6A2D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C864C5B-71C7-40F9-87E4-38C40B403062"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "700023BC-C599-48B8-9270-9F9FEF5226A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E95DC7AD-6FAB-452B-B28D-897B0A54A8A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C450C35-F3AE-4764-B526-C8AC72ACE23D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7163742C-2D4A-4B9A-A5F0-9EE7C0EDEECD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "936C4011-EA09-49D3-B691-0BA723B0A12A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34A654BC-1438-47B6-8003-8B26BCC5609D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15FCBDCA-F7AF-4AB7-9969-03C4B54708CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B636D4C-EEE2-4DE2-A0BE-D027F2685596"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB26588E-4BDE-404B-B260-97409CBA5484"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9E36183-43A7-4F1E-AA0F-6B4F7DC508A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83BE0150-A046-4471-A8DC-84B452D48E23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "291162BE-4233-4BA5-B8B0-6AF52D2D82F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A806750-804B-4B95-A627-6FE9F438502F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDAEBA25-BA6E-4E5C-8602-1AFD5211148B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D3447A9-A5F4-4B5C-A9EE-512EBD902AC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E222E1CA-7A13-42BC-ADC7-C2435A7111D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC205C79-0841-4AB3-8DAE-D01813615DF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97261FA3-E148-430A-B019-1CC2D8C3732F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50D20009-880B-470E-84DF-20E8A0795E3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E15905A8-2BC7-4A5D-8C93-9FC703F0B705"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A3BEF89-20FC-4BB6-B1BC-3795235ED998"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E8BBA0E-5CD3-4F83-B664-8C235548A233"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB74768A-D3C9-4D47-8F3E-850855EBB5D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFBAD221-BBD3-4BE6-974F-361C8E0FC6E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2017-01-06",
|
|
"matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.50\\(aazi.0\\)c0",
|
|
"matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*",
|
|
"matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1035159",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1035160",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |