Executive Summary

Summary
Title Cisco NX-OS Software Pong Packet Denial of Service Vulnerability
Informations
Name cisco-sa-20180117-nx-os First vendor Publication 2018-01-17
Vendor Cisco Last vendor Modification 2018-01-17
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 6.1 Attack Range Adjacent network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the Pong tool of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition.

The vulnerability exists because the affected software attempts to free the same area of memory twice. An attacker could exploit this vulnerability by sending a pong request to an affected device from a location on the network that causes the pong reply packet to egress both a FabricPath port and a non-FabricPath port. An exploit could allow the attacker to cause a dual or quad supervisor virtual port-channel (vPC) to reload.

Note: This vulnerability is exploitable only when all of the following are true:

The Pong tool is enabled on an affected device. The Pong tool is disabled in NX-OS by default. The FabricPath feature is enabled on an affected device. The FabricPath feature is disabled in NX-OS by default. A FabricPath port is actively monitored via a Switched Port Analyzer (SPAN) session. SPAN sessions are not configured or enabled in NX-OS by default. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nx-os ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nx-os"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJaX3RKXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczSusQAJ7bsLDKdGrfJjsKzy115mri4iRr MZxBrrqhTorGKmifzpwlIwkpkficuETYpb1JcbssiQ3KO9OCZEiN6+agIaDUrZRZ QWkC/K5hrnmO+iAcMMkW2Pv/NssBE6ag6vhFNMkZQcP9OkRaZZPmgSWzvJd4czpv dakYg1hllpR8I1+Uy/wH+a6t6Z4xc8aQIcTTWxg2Zb559epbRqjV4iXQ3gpEaz+W Qw+1H3bit/kHz52FsKarUOZwJcHchrLCLL63VKxUcLD8F6MXzS2gG+qgoZLs0Nxz 7tifaUAZvVIzb58jzMWK/dHkW3dnjGOfK31VEHfe1bFlJdWvyUDQmJvMuoqL5ODO f4EFVs/cZMpxuzBbO8iH0anYRtf9UNN1ozvJ/znB5TPuHI/SQFKEIIJvuCw1rtit 7zFUUrT2iv5JbRUCLDTjxhmXgzCS6NJeZlunjetIKQPm+9to4bHEkdFp2w3hLdbN 8t1d8O2XrhnpWJUOSTYMkB2qehBV3ir23QCTkBf5bVDrzpTPaOC1rnGwbQfYJwPf 5xTlR/f3qrwr1izUlP86xSJvOWqIcBUNXwoV/UczoxEsY3LbJC5CbOSkcE8fizxp qb/FBRQjarO9xticzJFyIJJhyPlF8ceHPgIdes2WvtxDBTpO19qvPQ8BoGcSK5Up D/TD9ZhQsmIb01cs =Fvcv END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-415 Double Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 3

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2018-02-07 17:22:01
  • Multiple Updates
2018-01-18 12:10:36
  • Multiple Updates
2018-01-17 21:21:33
  • First insertion