cve-2015-0718
Vulnerability from cvelistv5
Published
2016-03-03 22:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035159" }, { "name": "20160302 Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack" }, { "name": "1035160", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035160" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1035159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035159" }, { "name": "20160302 Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack" }, { "name": "1035160", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035160" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035159" }, { "name": "20160302 Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack" }, { "name": "1035160", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035160" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0718", "datePublished": "2016-03-03T22:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB6F78F3-0C2E-4F0F-8D2E-31B67DB42472\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A80A2C90-5B7C-4EC1-80A9-729A0F06031E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65BC2A14-4A72-4758-BE17-CBF827569D86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D1909BD-03D2-4F27-9072-4EB8261F19AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B9195CA-1339-4893-B8A4-971F4B925349\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7D87DEE-2CEC-463F-835A-1974B4C4F1E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1628CE3-1493-4C35-941D-8C3AA1044467\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE970756-5E04-4FAE-8589-AC68AA52EC85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"781FF06A-3F99-4DC7-A79D-C8582E5C5FF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D3819FA-1AAE-48C6-9137-DACF35F820BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5557821-D83E-4D39-8499-A1503EDA13E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"259FC572-CAC3-4AC7-847E-8DADF58F6244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E99A5257-B675-43E8-AB96-9E8AE5C38770\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD515D92-4684-4C6A-B357-C0C1760332B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52C9D48E-69BE-437C-AEAA-8087E7BDE01A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6FB1056-A8C0-498A-94DB-CF3D6B4B1952\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9673825E-FA14-4E70-8B5C-A6978E78C2C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38CBE00C-943C-4370-9E94-18B2A59384FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45D47062-3D36-44B3-A03F-E716CA28E490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCAE42A-01E0-4120-93B6-6C65C3CC5840\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"037BF8C3-352F-413F-81B3-F982979F1D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9ED255-9107-4408-9594-9DAB32DEB793\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E6A1EF9-2AD6-4592-B9B2-68B7D31818EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"208A941A-6D38-4A87-BC9C-08533CC5A345\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70287DD2-D08B-4651-B919-98132083955E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C509B7EC-3249-4F81-A84F-07A591A7607D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ADB38CA-107C-4B25-A3F4-481BD40E2B13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1914FC5D-F732-45D1-B743-C001FC097C45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05A47393-B4EC-4463-A3C8-18DA544180BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FAC5FB0-D5A7-4C94-A3EA-945AE98BA06E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C875EC7-6B52-4CA8-9114-94B643C8B6CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACF61A3E-628A-4B44-96B7-7FC287012A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5E85B5F-34DA-4AB8-B024-67356622753F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44454A17-1A9A-4C9B-8B3D-09B4FEA57EC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1433216-CD80-4592-88A9-F77609E6A2D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C864C5B-71C7-40F9-87E4-38C40B403062\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700023BC-C599-48B8-9270-9F9FEF5226A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E95DC7AD-6FAB-452B-B28D-897B0A54A8A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C450C35-F3AE-4764-B526-C8AC72ACE23D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7163742C-2D4A-4B9A-A5F0-9EE7C0EDEECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"936C4011-EA09-49D3-B691-0BA723B0A12A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34A654BC-1438-47B6-8003-8B26BCC5609D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15FCBDCA-F7AF-4AB7-9969-03C4B54708CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B636D4C-EEE2-4DE2-A0BE-D027F2685596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB26588E-4BDE-404B-B260-97409CBA5484\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9E36183-43A7-4F1E-AA0F-6B4F7DC508A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83BE0150-A046-4471-A8DC-84B452D48E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"291162BE-4233-4BA5-B8B0-6AF52D2D82F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A806750-804B-4B95-A627-6FE9F438502F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDAEBA25-BA6E-4E5C-8602-1AFD5211148B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D3447A9-A5F4-4B5C-A9EE-512EBD902AC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E222E1CA-7A13-42BC-ADC7-C2435A7111D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC205C79-0841-4AB3-8DAE-D01813615DF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97261FA3-E148-430A-B019-1CC2D8C3732F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50D20009-880B-470E-84DF-20E8A0795E3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E15905A8-2BC7-4A5D-8C93-9FC703F0B705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A3BEF89-20FC-4BB6-B1BC-3795235ED998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E8BBA0E-5CD3-4F83-B664-8C235548A233\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB74768A-D3C9-4D47-8F3E-850855EBB5D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFBAD221-BBD3-4BE6-974F-361C8E0FC6E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-01-06\", \"matchCriteriaId\": \"0AF8ACF6-2BDF-49C2-B92F-2207D83664BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A5867B4-EC19-45D4-87BE-867E1D41ECD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*\", \"matchCriteriaId\": \"09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.50\\\\(aazi.0\\\\)c0\", \"matchCriteriaId\": \"21D9999F-C55E-4BAB-A401-007FB34B2A5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"83223AC7-22F3-4FCA-B11B-B769086DCF04\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.\"}, {\"lang\": \"es\", \"value\": \"Cisco NX-OS 4.0 hasta la versi\\u00f3n 6.1 en dispositivos Nexus 1000V 3000, 4000, 5000, 6000 y 7000 y plataformas Unified Computing System (UCS) permite a atancantes remotos causar una denegaci\\u00f3n de servicio (recarga de pila TCP) mediante el env\\u00edo de paquetes TCP manipulados a un dispositivo que tenga una sesi\\u00f3n TIME_WAIT TCP, tambi\\u00e9n conocido como Bug ID CSCub70579.\"}]", "id": "CVE-2015-0718", "lastModified": "2024-11-21T02:23:35.747", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false}]}", "published": "2016-03-03T22:59:02.707", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1035159\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id/1035160\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1035159\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1035160\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2015-0718\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2016-03-03T22:59:02.707\",\"lastModified\":\"2024-11-21T02:23:35.747\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.\"},{\"lang\":\"es\",\"value\":\"Cisco NX-OS 4.0 hasta la versi\u00f3n 6.1 en dispositivos Nexus 1000V 3000, 4000, 5000, 6000 y 7000 y plataformas Unified Computing System (UCS) permite a atancantes remotos causar una denegaci\u00f3n de servicio (recarga de pila TCP) mediante el env\u00edo de paquetes TCP manipulados a un dispositivo que tenga una sesi\u00f3n TIME_WAIT TCP, tambi\u00e9n conocido como Bug ID CSCub70579.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6F78F3-0C2E-4F0F-8D2E-31B67DB42472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A80A2C90-5B7C-4EC1-80A9-729A0F06031E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65BC2A14-4A72-4758-BE17-CBF827569D86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D1909BD-03D2-4F27-9072-4EB8261F19AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B9195CA-1339-4893-B8A4-971F4B925349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7D87DEE-2CEC-463F-835A-1974B4C4F1E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1628CE3-1493-4C35-941D-8C3AA1044467\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE970756-5E04-4FAE-8589-AC68AA52EC85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"781FF06A-3F99-4DC7-A79D-C8582E5C5FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3819FA-1AAE-48C6-9137-DACF35F820BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5557821-D83E-4D39-8499-A1503EDA13E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"259FC572-CAC3-4AC7-847E-8DADF58F6244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E99A5257-B675-43E8-AB96-9E8AE5C38770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD515D92-4684-4C6A-B357-C0C1760332B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9D48E-69BE-437C-AEAA-8087E7BDE01A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FB1056-A8C0-498A-94DB-CF3D6B4B1952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9673825E-FA14-4E70-8B5C-A6978E78C2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CBE00C-943C-4370-9E94-18B2A59384FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D47062-3D36-44B3-A03F-E716CA28E490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCAE42A-01E0-4120-93B6-6C65C3CC5840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"037BF8C3-352F-413F-81B3-F982979F1D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9ED255-9107-4408-9594-9DAB32DEB793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E6A1EF9-2AD6-4592-B9B2-68B7D31818EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208A941A-6D38-4A87-BC9C-08533CC5A345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70287DD2-D08B-4651-B919-98132083955E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C509B7EC-3249-4F81-A84F-07A591A7607D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADB38CA-107C-4B25-A3F4-481BD40E2B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1914FC5D-F732-45D1-B743-C001FC097C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A47393-B4EC-4463-A3C8-18DA544180BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAC5FB0-D5A7-4C94-A3EA-945AE98BA06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C875EC7-6B52-4CA8-9114-94B643C8B6CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACF61A3E-628A-4B44-96B7-7FC287012A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E85B5F-34DA-4AB8-B024-67356622753F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44454A17-1A9A-4C9B-8B3D-09B4FEA57EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1433216-CD80-4592-88A9-F77609E6A2D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C864C5B-71C7-40F9-87E4-38C40B403062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700023BC-C599-48B8-9270-9F9FEF5226A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95DC7AD-6FAB-452B-B28D-897B0A54A8A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C450C35-F3AE-4764-B526-C8AC72ACE23D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7163742C-2D4A-4B9A-A5F0-9EE7C0EDEECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936C4011-EA09-49D3-B691-0BA723B0A12A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A654BC-1438-47B6-8003-8B26BCC5609D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FCBDCA-F7AF-4AB7-9969-03C4B54708CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B636D4C-EEE2-4DE2-A0BE-D027F2685596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB26588E-4BDE-404B-B260-97409CBA5484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E36183-43A7-4F1E-AA0F-6B4F7DC508A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83BE0150-A046-4471-A8DC-84B452D48E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291162BE-4233-4BA5-B8B0-6AF52D2D82F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A806750-804B-4B95-A627-6FE9F438502F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDAEBA25-BA6E-4E5C-8602-1AFD5211148B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3447A9-A5F4-4B5C-A9EE-512EBD902AC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E222E1CA-7A13-42BC-ADC7-C2435A7111D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC205C79-0841-4AB3-8DAE-D01813615DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97261FA3-E148-430A-B019-1CC2D8C3732F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D20009-880B-470E-84DF-20E8A0795E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E15905A8-2BC7-4A5D-8C93-9FC703F0B705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3BEF89-20FC-4BB6-B1BC-3795235ED998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E8BBA0E-5CD3-4F83-B664-8C235548A233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74768A-D3C9-4D47-8F3E-850855EBB5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFBAD221-BBD3-4BE6-974F-361C8E0FC6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-01-06\",\"matchCriteriaId\":\"0AF8ACF6-2BDF-49C2-B92F-2207D83664BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A5867B4-EC19-45D4-87BE-867E1D41ECD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.50\\\\(aazi.0\\\\)c0\",\"matchCriteriaId\":\"21D9999F-C55E-4BAB-A401-007FB34B2A5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"83223AC7-22F3-4FCA-B11B-B769086DCF04\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1035159\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035160\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1035159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.