var-201405-0356
Vulnerability from variot
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0356", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u3\\(1\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u2\\(2c\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u2\\(2a\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u2\\(2\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u2\\(2d\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u3\\(2a\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u3\\(2\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u2\\(2b\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u3\\(2b\\)", }, { model: "nx-os", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0\\(3\\)u5\\(1e\\)", }, { model: "nx-os", scope: null, trust: 1.4, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(2\\)n1\\(1\\)", }, { model: "nexus 7000", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n1\\(1\\)", }, { model: "unified computing system 6140xp fabric interconnect", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 3048", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(2\\)", }, { model: "cg-os", scope: "eq", trust: 1, vendor: "cisco", version: "cg4\\(1\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(1a\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u5\\(1\\)", }, { model: "nexus 5010", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u1\\(2a\\)", }, { model: "cgr 1120", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u1\\(1a\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(2\\)n2\\(1a\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u4\\(1\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.2", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n1\\(1c\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u1\\(2\\)", }, { model: "nexus 3016q", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 5548up", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 5548p", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 5020p switch", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n2\\(1\\)", }, { model: "nexus 3548", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u5\\(1a\\)", }, { model: "cg-os", scope: "eq", trust: 1, vendor: "cisco", version: "cg4", }, { model: "unified computing system infrastructure and unified computing system software", scope: "eq", trust: 1, vendor: "cisco", version: "1.4\\(1j\\)", }, { model: "nexus 4001i", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u2\\(1\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(2\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(2\\)n2\\(1\\)", }, { model: "nexus 5000", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 7000 9-slot", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "unified computing system 6296up fabric interconnect", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 7000 18-slot", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(1\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u5\\(1c\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "4.1.\\(2\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(5\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(3\\)", }, { model: "unified computing system 6248up fabric interconnect", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n2\\(2\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u5\\(1d\\)", }, { model: "cgr 1240", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n2\\(2a\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n2\\(2b\\)", }, { model: "nexus 5596up", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n1\\(1b\\)", }, { model: "nexus 3064x", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)n1\\(1a\\)", }, { model: "unified computing system 6120xp fabric interconnect", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(3\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u1\\(1b\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(2a\\)", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.1", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(1\\)", }, { model: "nexus 7000 10-slot", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 5010p switch", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u5\\(1b\\)", }, { model: "nexus 5020", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nexus 3064t", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "5.0\\(3\\)u1\\(1d\\)", }, { model: "nexus 5548up switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5010p switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5596up switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5010p switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5020 switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5548p switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5020 switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5020p switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5000 series switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5020p switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5548p switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5000 series switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5010 switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5010 switch", scope: "lt", trust: 0.8, vendor: "cisco", version: "5.x", }, { model: "nexus 5596up switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nexus 5548up switch", scope: "eq", trust: 0.8, vendor: "cisco", version: "software 5.1(3)n1(1)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "4.2(4)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "4.2(3)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "4.2(6)", }, { model: "unified computing system fabric interconnects", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "nx-os ucs", scope: "eq", trust: 0.3, vendor: "cisco", version: "62000", }, { model: "nx-os ucs", scope: "eq", trust: 0.3, vendor: "cisco", version: "61000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "70000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "60000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "40000", }, { model: "nx-os nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "30000", }, { model: "nx-os mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "nx-os for nexus series", scope: "eq", trust: 0.3, vendor: "cisco", version: "70000", }, { model: "nx-os for nexus series", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "nx-os for nexus series", scope: "eq", trust: 0.3, vendor: "cisco", version: "40000", }, { model: "nx-os for nexus series", scope: "eq", trust: 0.3, vendor: "cisco", version: "30000", }, { model: "nx-os cgr", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "connected grid router series cg-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000", }, { model: "nx-os ucs 2.2", scope: "ne", trust: 0.3, vendor: "cisco", version: "6200", }, { model: "nx-os ucs 2.2", scope: "ne", trust: 0.3, vendor: "cisco", version: "6100", }, { model: "nx-os nexus", scope: "ne", trust: 0.3, vendor: "cisco", version: "70006.2(8)", }, { model: "nx-os nexus 7.0 n1", scope: "ne", trust: 0.3, vendor: "cisco", version: "5000", }, { model: "nx-os nexus 6.0 n2", scope: "ne", trust: 0.3, vendor: "cisco", version: "5000", }, { model: "nx-os nexus 5.2 n1", scope: "ne", trust: 0.3, vendor: "cisco", version: "5000", }, { model: "nx-os nexus 4.1 e1", scope: "ne", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "nx-os nexus 6.0 u2", scope: "ne", trust: 0.3, vendor: "cisco", version: "3000", }, { model: "nx-os nexus 5.0 u5", scope: "ne", trust: 0.3, vendor: "cisco", version: "3000", }, { model: "nx-os mds", scope: "ne", trust: 0.3, vendor: "cisco", version: "90006.2(7)", }, { model: "nx-os cgr cg4", scope: "ne", trust: 0.3, vendor: "cisco", version: "1000", }, { model: "nx-os cgr 15.4 cg", scope: "ne", trust: 0.3, vendor: "cisco", version: "1000", }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "BID", id: "67575", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, { db: "CNNVD", id: "CNNVD-201405-482", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:cg-os:cg4\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:cg-os:cg4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:cgr_1120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:cgr_1240:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:nexus_5020p_switch:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2014-3261", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "67575", }, ], trust: 0.3, }, cve: "CVE-2014-3261", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", exploitabilityScore: 4.9, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "High", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.6, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2014-3261", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", exploitabilityScore: 4.9, id: "CNVD-2014-03244", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", exploitabilityScore: 4.9, id: "VHN-71201", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:H/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2014-3261", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2014-03244", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201405-482", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-71201", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "VULHUB", id: "VHN-71201", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, { db: "CNNVD", id: "CNNVD-201405-482", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nAttackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322", sources: [ { db: "NVD", id: "CVE-2014-3261", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "CNVD", id: "CNVD-2014-03244", }, { db: "BID", id: "67575", }, { db: "VULHUB", id: "VHN-71201", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2014-3261", trust: 3.4, }, { db: "BID", id: "67575", trust: 1, }, { db: "JVNDB", id: "JVNDB-2014-002654", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201405-482", trust: 0.7, }, { db: "CNVD", id: "CNVD-2014-03244", trust: 0.6, }, { db: "CISCO", id: "20140521 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS", trust: 0.6, }, { db: "VULHUB", id: "VHN-71201", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "VULHUB", id: "VHN-71201", }, { db: "BID", id: "67575", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, { db: "CNNVD", id: "CNNVD-201405-482", }, ], }, id: "VAR-201405-0356", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "VULHUB", id: "VHN-71201", }, ], trust: 1.3607143, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, ], }, last_update_date: "2023-12-18T12:51:57.193000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20140521-nxos", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140521-nxos", }, { title: "34247", trust: 0.8, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=34247", }, { title: "cisco-sa-20140521-nxos", trust: 0.8, url: "http://www.cisco.com/cisco/web/support/jp/112/1122/1122585_cisco-sa-20140521-nxos-j.html", }, { title: "Patch for multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerabilities", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/45867", }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-71201", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140521-nxos", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3261", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3261", }, { trust: 0.3, url: "http://www.cisco.com/", }, { trust: 0.3, url: "http://www.cisco.com/en/us/products/ps9494/products_sub_category_home.html", }, ], sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "VULHUB", id: "VHN-71201", }, { db: "BID", id: "67575", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, { db: "CNNVD", id: "CNNVD-201405-482", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "VULHUB", id: "VHN-71201", }, { db: "BID", id: "67575", }, { db: "JVNDB", id: "JVNDB-2014-002654", }, { db: "NVD", id: "CVE-2014-3261", }, { db: "CNNVD", id: "CNNVD-201405-482", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2014-05-26T00:00:00", db: "CNVD", id: "CNVD-2014-03244", }, { date: "2014-05-26T00:00:00", db: "VULHUB", id: "VHN-71201", }, { date: "2014-05-21T00:00:00", db: "BID", id: "67575", }, { date: "2014-05-28T00:00:00", db: "JVNDB", id: "JVNDB-2014-002654", }, { date: "2014-05-26T00:25:32.220000", db: "NVD", id: "CVE-2014-3261", }, { date: "2014-05-28T00:00:00", db: "CNNVD", id: "CNNVD-201405-482", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2014-05-26T00:00:00", db: "CNVD", id: "CNVD-2014-03244", }, { date: "2018-10-30T00:00:00", db: "VULHUB", id: "VHN-71201", }, { date: "2014-05-21T00:00:00", db: "BID", id: "67575", }, { date: "2014-05-28T00:00:00", db: "JVNDB", id: "JVNDB-2014-002654", }, { date: "2018-10-30T16:26:48.327000", db: "NVD", id: "CVE-2014-3261", }, { date: "2014-05-28T00:00:00", db: "CNNVD", id: "CNNVD-201405-482", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201405-482", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco Multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerability", sources: [ { db: "CNVD", id: "CNVD-2014-03244", }, { db: "BID", id: "67575", }, ], trust: 0.9, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer overflow", sources: [ { db: "CNNVD", id: "CNNVD-201405-482", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.