FKIE_CVE-2011-4023
Vulnerability from fkie_nvd - Published: 2012-05-03 10:11 - Updated: 2025-04-11 00:51
Severity ?
Summary
Memory leak in libcmd in Cisco NX-OS 5.0 on Nexus switches allows remote authenticated users to cause a denial of service (memory consumption) via SNMP requests, aka Bug ID CSCtr65682.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nexus_2148t_fex_switch | - | |
| cisco | nexus_2224tp_fex_switch | - | |
| cisco | nexus_2232pp_fex_switch | - | |
| cisco | nexus_2232tm_fex_switch | - | |
| cisco | nexus_2248tp_e_fex_switch | - | |
| cisco | nexus_2248tp_fex_switch | - | |
| cisco | nexus_5010p_switch | - | |
| cisco | nexus_5020p_switch | - | |
| cisco | nexus_5548p | - | |
| cisco | nexus_5548up | - | |
| cisco | nexus_5596up | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_2148t_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1898BDC8-BC36-42C7-933A-43287F3119AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_2224tp_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "156B5256-CB59-4351-B0AA-A4E105ADB677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_2232pp_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "434EBB2A-818A-4EB5-928D-71E2B256317D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_2232tm_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADCA9CE1-76AB-412A-8A07-F651BAFA4CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_2248tp_e_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB226EF-FBC5-4EAD-B9F0-53DF6F46B76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_2248tp_fex_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B1097F-5BDE-4E2A-A49B-5380C4CAAFAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD1E96B-1927-42DC-A47B-5632CED2D40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5020p_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0737BA36-75AB-478D-9001-3DA3E49C6F00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory leak in libcmd in Cisco NX-OS 5.0 on Nexus switches allows remote authenticated users to cause a denial of service (memory consumption) via SNMP requests, aka Bug ID CSCtr65682."
},
{
"lang": "es",
"value": "P\u00e9rdida de memoria en libcmd en Cisco NX-OS v5.0 en Nexus switches permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de peticiones SNMP, tambi\u00e9n conocido como Bug ID CSCtr65682."
}
],
"id": "CVE-2011-4023",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-05-03T10:11:39.640",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_0_3_N2_1/Nexus5000_Release_Notes_5_0_3_N2.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_0_3_N2_1/Nexus5000_Release_Notes_5_0_3_N2.html"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…