CVE-2015-0718 (CNNVD-201603-009)

HIGH
中文标题:
Cisco NX-OS Software TCP栈拒绝服务漏洞
英文标题:
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Comp...
CVSS分数: 7.5
发布时间: 2016-03-03 22:00:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco NX-OS Software是美国思科(Cisco)公司的一套面向数据中心的操作系统。 Cisco NX-OS Software的TCP栈中存在安全漏洞,该漏洞源于当设备处于TIME_WAIT状态时程序没有正确处理TCP会话的关闭序列中的TCP数据包。远程攻击者可利用该漏洞造成拒绝服务(重载)。以下产品受到影响:Cisco Nexus 1000V Series Switches,Nexus 3000 Series Switches,Nexus 4000 Series Switches,Nexus 5000 Series Switches,Nexus 6000 Series Switches,Nexus 7000 Series Switches,运行NX-OS Software的Unified Computing System(UCS)。

英文描述:

Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.

CWE类型:
CWE-399
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco unified_computing_system 1.4_1i - - cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_1j - - cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_1m - - cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3i - - cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3l - - cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3m - - cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3q - - cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3s - - cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3u - - cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_3y - - cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4f - - cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4g - - cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4i - - cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4j - - cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4k - - cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*
cisco unified_computing_system 1.4_4l - - cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*
cisco unified_computing_system 1.5_base - - cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*
cisco unified_computing_system 1.6_base - - cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_1q - - cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_1s - - cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_1t - - cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_1w - - cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_1x - - cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_2m - - cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_2q - - cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_2r - - cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_3a - - cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_3b - - cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_3c - - cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_4a - - cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_4b - - cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_4d - - cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5a - - cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5b - - cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5c - - cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5d - - cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5e - - cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*
cisco unified_computing_system 2.0_5f - - cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_1a - - cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_1b - - cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_1d - - cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_1e - - cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_1f - - cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_2a - - cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_2c - - cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_2d - - cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3a - - cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3b - - cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3c - - cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3d - - cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3e - - cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*
cisco unified_computing_system 2.1_3f - - cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_1b - - cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_1c - - cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_1d - - cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_1e - - cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_2c - - cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_2d - - cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*
cisco unified_computing_system 2.2_2e - - cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*
cisco nx-os base - - cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*
netgear jr6150_firmware * - - cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*
samsung x14j_firmware t-ms14jakucb-1102.5 - - cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
sun opensolaris snv_124 - - cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*
zyxel gs1900-10hp_firmware * - - cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*
zzinc keymouse_firmware 3.08 - - cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1035159 vdb-entry
cve.org
访问
20160302 Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability vendor-advisory
cve.org
访问
1035160 vdb-entry
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.0
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2016-03-03 22:00:00
修改时间:
2024-08-06 04:17:32
创建时间:
2025-11-11 15:33:58
更新时间:
2025-11-11 15:52:25
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2015-0718 2025-11-11 15:18:53 2025-11-11 07:33:58
NVD nvd_CVE-2015-0718 2025-11-11 14:54:53 2025-11-11 07:42:41
CNNVD cnnvd_CNNVD-201603-009 2025-11-11 15:09:39 2025-11-11 07:52:25
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:52:25
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201603-009; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201603-009
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:41
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 65; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 65
  • data_sources: ['cve'] -> ['cve', 'nvd']