fkie_cve-2016-1465
Vulnerability from fkie_nvd
Published
2016-07-28 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco Nexus 1000v Application Virtual Switch (AVS) devices before 5.2(1)SV3(1.5i) allow remote attackers to cause a denial of service (ESXi hypervisor crash and purple screen) via a crafted Cisco Discovery Protocol packet that triggers an out-of-bounds memory access, aka Bug ID CSCuw57985.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4b\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.2\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.2b\) | |
| cisco | nx-os | 4.2\(1\)sv2\(1.1\) | |
| cisco | nx-os | 4.2\(1\)sv2\(1.1a\) | |
| cisco | nx-os | 4.2\(1\)sv2\(2.1\) | |
| cisco | nx-os | 4.2\(1\)sv2\(2.1a\) | |
| cisco | nx-os | 5.2\(1\)sv3\(1.1\) | |
| cisco | nx-os | 5.2\(1\)sv3\(1.3\) | |
| cisco | nx-os | 5.2\(1\)sv3\(1.4\) | |
| cisco | nexus_1000v | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E595AFD-D9C5-4DDA-A56F-127D7AE513FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6C9FB95F-8F32-40FF-B40F-FDB375ADD946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15BAAE40-EBEF-4FC3-B1D0-96EF814F0C1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F686E9-C88F-4CF1-8C90-1AF6D80EBAA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv2\\(1.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DFC33DBB-D098-408C-BCEA-7068D23AF51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv2\\(1.1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E81ABF34-25C9-4168-B9DA-AABB870DD476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv2\\(2.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FC2ED25-A2B7-4273-93EB-7DEE6D345AC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv2\\(2.1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "837EBA81-8511-4189-8F68-AD1516E8D7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95F0898B-06EC-426E-98A6-753FD1FA1250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5264C81D-8FA2-4C83-A136-A5F2A298DB08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "675E1BB5-E0B5-4123-819F-641DB1277EC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Nexus 1000v Application Virtual Switch (AVS) devices before 5.2(1)SV3(1.5i) allow remote attackers to cause a denial of service (ESXi hypervisor crash and purple screen) via a crafted Cisco Discovery Protocol packet that triggers an out-of-bounds memory access, aka Bug ID CSCuw57985."
},
{
"lang": "es",
"value": "Dispositivos Cisco Nexus 1000v Application Virtual Switch (AVS) en versiones anteriores a 5.2(1)SV3(1.5i) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de hipervisor ESXi y pantalla morada) a trav\u00e9s de un paquete Cisco Discovery Protocol manipulado que desencadena un acceso a memoria fuera de rango, tambi\u00e9n conocido como Bug ID CSCuw57985."
}
],
"id": "CVE-2016-1465",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-07-28T01:59:44.853",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/92154"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id/1036469"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/92154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1036469"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…