Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-1178 | First vendor Publication | 2013-04-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.3 | Attack Range | Adjacent network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1178 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-05-09 | IAVM : 2013-A-0100 - Multiple Vulnerabilities in Cisco NX-OS-Based Products Severity : Category I - VMSKEY : V0037772 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-05-31 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20130424-nxosmulti-nxos.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:33:50 |
|
2023-10-19 01:18:52 |
|
2023-08-22 12:18:43 |
|
2022-10-11 01:06:14 |
|
2021-05-08 01:11:20 |
|
2021-04-22 12:02:46 |
|
2021-04-22 01:29:04 |
|
2020-05-24 01:10:40 |
|
2020-05-23 00:36:23 |
|
2017-11-09 12:05:05 |
|
2017-11-08 12:01:52 |
|
2017-08-16 12:02:15 |
|
2016-10-08 01:01:23 |
|
2016-06-28 19:21:13 |
|
2016-04-26 22:55:39 |
|
2014-02-17 11:17:09 |
|
2013-11-11 12:40:15 |
|
2013-05-10 22:29:19 |
|
2013-04-25 21:19:33 |
|
2013-04-25 17:19:41 |
|