Search criteria

6 vulnerabilities found for cg-os by cisco

VAR-201405-0356

Vulnerability from variot - Updated: 2025-04-13 23:21

Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0356",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(2c\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(2a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u3\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u3\\(2a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u3\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(2b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u3\\(2b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1e\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(2d\\)"
      },
      {
        "model": "nx-os",
        "scope": null,
        "trust": 1.4,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n2\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(1j\\)"
      },
      {
        "model": "cgr 1120",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1\\)"
      },
      {
        "model": "nexus 3048",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(5\\)"
      },
      {
        "model": "cgr 1240",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(2\\)"
      },
      {
        "model": "nexus 4001i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2a\\)"
      },
      {
        "model": "nexus 7000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system 6140xp fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg4\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1c\\)"
      },
      {
        "model": "nexus 7000 9-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1d\\)"
      },
      {
        "model": "nexus 7000 10-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system 6248up fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system 6120xp fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2\\(3\\)"
      },
      {
        "model": "nexus 3064t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(3\\)"
      },
      {
        "model": "nexus 3548",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system 6296up fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1\\)"
      },
      {
        "model": "nexus 5020p switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1b\\)"
      },
      {
        "model": "nexus 5010p switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5596up",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(1\\)"
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg4"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1c\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u1\\(1a\\)"
      },
      {
        "model": "nexus 5010",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u5\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u1\\(1d\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n2\\(1\\)"
      },
      {
        "model": "nexus 5548p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5548up",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u1\\(1b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u4\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)"
      },
      {
        "model": "nexus 3016q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5020",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 18-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u1\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(2\\)"
      },
      {
        "model": "nexus 3064x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)u1\\(2a\\)"
      },
      {
        "model": "nexus 5548up switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5010p switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5596up switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5010p switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5020 switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5548p switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5020 switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5020p switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5000 series switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5020p switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5548p switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5000 series switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5010 switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5010 switch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "nexus 5596up switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nexus 5548up switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "software  5.1(3)n1(1)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.2(4)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.2(3)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.2(6)"
      },
      {
        "model": "unified computing system fabric interconnects",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "nx-os ucs",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "62000"
      },
      {
        "model": "nx-os ucs",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "61000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "60000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "40000"
      },
      {
        "model": "nx-os nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30000"
      },
      {
        "model": "nx-os mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90000"
      },
      {
        "model": "nx-os for nexus series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70000"
      },
      {
        "model": "nx-os for nexus series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50000"
      },
      {
        "model": "nx-os for nexus series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "40000"
      },
      {
        "model": "nx-os for nexus series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30000"
      },
      {
        "model": "nx-os cgr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10000"
      },
      {
        "model": "connected grid router series cg-os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "nx-os ucs 2.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6200"
      },
      {
        "model": "nx-os ucs 2.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6100"
      },
      {
        "model": "nx-os nexus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70006.2(8)"
      },
      {
        "model": "nx-os nexus 7.0 n1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "nx-os nexus 6.0 n2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "nx-os nexus 5.2 n1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "nx-os nexus 4.1 e1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "nx-os nexus 6.0 u2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "nx-os nexus 5.0 u5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "nx-os mds",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90006.2(7)"
      },
      {
        "model": "nx-os cgr cg4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "nx-os cgr 15.4 cg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "BID",
        "id": "67575"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:cgr_1120",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:cgr_1240",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:cg-os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3016q",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3048",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3064x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3548",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_4001i",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5010_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5010p_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5020_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5020p_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5548p_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5548up_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5596up_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_10-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_18-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_9-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:nx-os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6120xp_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6140xp_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6248up_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6296up_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:ucs_infrastructure_and_ucs_software",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "67575"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-3261",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "CVE-2014-3261",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2014-03244",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "VHN-71201",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-3261",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-3261",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-03244",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201405-482",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-71201",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nAttackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "BID",
        "id": "67575"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-3261",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "67575",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20140521 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "db": "BID",
        "id": "67575"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "id": "VAR-201405-0356",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      }
    ],
    "trust": 1.2357143
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:21:27.278000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20140521-nxos",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
      },
      {
        "title": "34247",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34247"
      },
      {
        "title": "cisco-sa-20140521-nxos",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/JP/112/1122/1122585_cisco-sa-20140521-nxos-j.html"
      },
      {
        "title": "Patch for multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/45867"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140521-nxos"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3261"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3261"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/ps9494/products_sub_category_home.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "db": "BID",
        "id": "67575"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "db": "BID",
        "id": "67575"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-05-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "date": "2014-05-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "date": "2014-05-21T00:00:00",
        "db": "BID",
        "id": "67575"
      },
      {
        "date": "2014-05-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "date": "2014-05-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "date": "2014-05-26T00:25:32.220000",
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-05-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-71201"
      },
      {
        "date": "2014-05-21T00:00:00",
        "db": "BID",
        "id": "67575"
      },
      {
        "date": "2014-05-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-002654"
      },
      {
        "date": "2014-05-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2014-3261"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03244"
      },
      {
        "db": "BID",
        "id": "67575"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201405-482"
      }
    ],
    "trust": 0.6
  }
}

VAR-201304-0277

Vulnerability from variot - Updated: 2025-04-11 22:55

Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275. plural CISCO Run on product Cisco NX-OS of Cisco Discovery Protocol (CDP) There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability Bug IDs CSCtu10630 , CSCtu10551 , CSCtu10550 , CSCtw56581 , CSCtu10548 , CSCtu10544 ,and CSCuf61275 It is released as.Malformed by a third party CDP An arbitrary code may be executed via a packet. The Cisco MDS 9000 is a family of multi-layer intelligent optical channel switches from Cisco. Cisco Nexus is a data center-class switch from Cisco. The Cisco Unified Computing System simplifies IT management and increases flexibility by consolidating unified computing, networking, storage access, and virtualization into one system. The Cisco Connected Grid Router is a router dedicated to smart grid-related devices. The vulnerability is caused by the malformed CDP packet being processed incorrectly. The vulnerability can be triggered by an attacker submitting a malformed CDP packet to the affected device. Since CDP works at the data link layer, an attacker must send an Ethernet frame directly to the affected device to exploit this vulnerability. Multiple Cisco NX-OS-Based products are prone to multiple remote buffer-overflow vulnerabilities because they fail to perform adequate boundary-checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the elevated privileges. Failed exploit attempts will result in a denial-of-service condition. These issues being tracked by Cisco Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0277",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.1\\(3\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1c\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2b\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1\\(1m\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(2\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1c\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1t\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3q\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(3\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1y\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(4j\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0\\(1s\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(3\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n2\\(2a\\)"
      },
      {
        "model": "nexus 3016q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2\\(3a\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3s\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(4g\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(6\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(3b\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(3\\)"
      },
      {
        "model": "nexus 5596up",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5020",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(8\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0\\(1q\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(2\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3l\\)"
      },
      {
        "model": "nx-os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0\\(1t\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(5\\)"
      },
      {
        "model": "nexus 5548up",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)sv1\\(5.1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2\\(3\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(3\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(1a\\)n2\\(1a\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1w\\)"
      },
      {
        "model": "nexus 5548p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)n2\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1n\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(3\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(5\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(6\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1q\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(1a\\)n2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(3\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1m\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(4i\\)"
      },
      {
        "model": "unified computing system 6296up fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(0\\)n1\\(2a\\)"
      },
      {
        "model": "connected grid router 1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n2\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.0\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(3d\\)"
      },
      {
        "model": "nexus 3064x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1p\\)"
      },
      {
        "model": "nexus 1000v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)sv1\\(4\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.1"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(3a\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3u\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.2"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(3c\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2a\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(1j\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3y\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(1a\\)n1\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.2\\(1d\\)"
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg1"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(4\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "6.0\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.2\\(1a\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(1m\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3i\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)sv1\\(4a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)n2\\(1\\)"
      },
      {
        "model": "nexus 3000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(3m\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(3\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(4f\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(0\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(2\\)"
      },
      {
        "model": "nexus 4001i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.2\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.4\\(4k\\)"
      },
      {
        "model": "nexus 3048",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0\\(1w\\)"
      },
      {
        "model": "cg-os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg4"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(4\\)sv1\\(2\\)"
      },
      {
        "model": "mds 9000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg2"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(4\\)"
      },
      {
        "model": "unified computing system 6140xp fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)n2\\(1a\\)"
      },
      {
        "model": "nexus 5000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(4\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1\\(1a\\)"
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "cg3"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(0\\)n1\\(2\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.\\(2a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(3\\)n2\\(1\\)"
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0\\(1x\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0\\(3\\)n1\\(1b\\)"
      },
      {
        "model": "unified computing system 6120xp fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 10-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0\\(2k\\)"
      },
      {
        "model": "unified computing system 6248up fabric interconnect",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1\\(3\\)n2\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0\\(1a\\)n1\\(1a\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)n1\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2\\(1\\)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.\\(5\\)"
      },
      {
        "model": "nexus 3064t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5010",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 18-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified computing system infrastructure and unified computing system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.3\\(1o\\)"
      },
      {
        "model": "nexus 3548",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 9-slot",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "connected grid router series cg3",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "nexus 3000 series switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 3048 switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 series switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ucs infrastructure and ucs manager software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "6100 series )"
      },
      {
        "model": "nexus 5548p switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "cisco mds 9000 series )"
      },
      {
        "model": "nexus 7000 9 slot switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 3064-t switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ucs 6120xp-20 port fabric interconnect",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ucs infrastructure and ucs manager software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.0(2m)"
      },
      {
        "model": "ucs 6140xp-40 port fabric interconnect",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3000 series )"
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "( cisco nexus 4000)"
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "6.x ( cisco nexus 7000 series )"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2(4)"
      },
      {
        "model": "mds 9000 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cg-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "( cisco 1000 series)"
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x ( cisco nexus 5500"
      },
      {
        "model": "1000 series connected grid router",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ucs 6296up 96 port fabric interconnect",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.0(3)u3(1)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "4.2(1)sv1(5.1)"
      },
      {
        "model": "cg-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "cg4(1)"
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5000 series )"
      },
      {
        "model": "nexus 5020 switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5500"
      },
      {
        "model": "ucs 6248up 48 port fabric interconnect",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "4.1(2)e1(1h)"
      },
      {
        "model": "ucs infrastructure and ucs manager software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "( cisco ucs 6200"
      },
      {
        "model": "nexus 5010 switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 10 slot switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 3548 switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 7000 18 slot switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 4001i switch module for ibm bladecenter",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "6.1(1)"
      },
      {
        "model": "nexus 5596up switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.1(3)n1(1)"
      },
      {
        "model": "nexus 5000 series switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "4.x ( cisco nexus 7000"
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x ( cisco nexus 4000"
      },
      {
        "model": "nexus 3064-x switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 1000v switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5548up switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "4.x ( cisco nexus 1000v series )"
      },
      {
        "model": "nx-os",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x ( cisco nexus 7000 series"
      },
      {
        "model": "nexus 3016q switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nx-os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5000 series"
      },
      {
        "model": "mds",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "9000"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "1000v"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "7000"
      },
      {
        "model": "connected grid router series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "unified computing system",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus 5.0 u2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "nexus 5.0 u1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "connected grid router series cg1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "unified computing system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.3(x)"
      },
      {
        "model": "unified computing system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.2(x)"
      },
      {
        "model": "unified computing system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.1(x)"
      },
      {
        "model": "unified computing system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70006.0(x)"
      },
      {
        "model": "nexus 5.2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7000"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70005.1(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70005.0(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70004.2(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70004.1(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50005.0(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50004.2(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50004.1(x)"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50004.0(x)"
      },
      {
        "model": "nexus 4.1 e1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "nexus 4.2 sv1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000v"
      },
      {
        "model": "nexus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000v4.0(x)"
      },
      {
        "model": "mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90005.2(3)"
      },
      {
        "model": "mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90005.0(x)"
      },
      {
        "model": "mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90004.2(x)"
      },
      {
        "model": "mds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90004.1(x)"
      },
      {
        "model": "unified computing system 2.1.1e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nexus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70006.1(1)"
      },
      {
        "model": "nexus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "70005.2(9)"
      },
      {
        "model": "nexus 5.2 n1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "nexus 4.1 e1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "nexus 5.0 u5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "nexus 4.2 sv2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000v"
      },
      {
        "model": "mds",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "90005.2(8)"
      },
      {
        "model": "connected grid router series cg4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:connected_grid_router_1000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:cg-os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:mds_9000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_1000v",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3016q",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3048",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3064t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3064x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_3548",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_4001i",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5010_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5020_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5548p_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5548up_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_5596up_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_10-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_18-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000_9-slot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:nexus_7000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:nx-os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6120xp_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6140xp_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6248up_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6296up_fabric_interconnect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:cisco:ucs_infrastructure_and_ucs_software",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-1178",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2013-1178",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2013-04354",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-61180",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-1178",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-1178",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-04354",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201304-529",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-61180",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275. plural CISCO Run on product Cisco NX-OS of Cisco Discovery Protocol (CDP) There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability Bug IDs CSCtu10630 , CSCtu10551 , CSCtu10550 , CSCtw56581 , CSCtu10548 , CSCtu10544 ,and CSCuf61275 It is released as.Malformed by a third party CDP An arbitrary code may be executed via a packet. The Cisco MDS 9000 is a family of multi-layer intelligent optical channel switches from Cisco. Cisco Nexus is a data center-class switch from Cisco. The Cisco Unified Computing System simplifies IT management and increases flexibility by consolidating unified computing, networking, storage access, and virtualization into one system. The Cisco Connected Grid Router is a router dedicated to smart grid-related devices. The vulnerability is caused by the malformed CDP packet being processed incorrectly. The vulnerability can be triggered by an attacker submitting a malformed CDP packet to the affected device. Since CDP works at the data link layer, an attacker must send an Ethernet frame directly to the affected device to exploit this vulnerability. Multiple Cisco NX-OS-Based products are prone to multiple remote buffer-overflow vulnerabilities because they fail to perform adequate boundary-checks on user-supplied data. \nAn attacker can exploit these issues to execute arbitrary code with the elevated privileges. Failed exploit attempts will result in a denial-of-service condition. \nThese issues being tracked by Cisco Bug IDs CSCtu10630, CSCtu10551,  CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-1178",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "59452",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20130424 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "53189",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "id": "VAR-201304-0277",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      }
    ],
    "trust": 1.28384495
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      }
    ]
  },
  "last_update_date": "2025-04-11T22:55:59.585000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20130424-nxosmulti",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
      },
      {
        "title": "29021",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=29021"
      },
      {
        "title": "28737",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28737"
      },
      {
        "title": "cisco-sa-20130424-nxosmulti",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/JP/111/1117/1117910_cisco-sa-20130424-nxosmulti-j.html"
      },
      {
        "title": "Patch for Multiple Cisco Product CDP Subsystem Buffer Overflow Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/33667"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130424-nxosmulti"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1178"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1178"
      },
      {
        "trust": 0.6,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29021"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/53189"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/59452"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "db": "BID",
        "id": "59452"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "date": "2013-04-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "date": "2013-04-24T00:00:00",
        "db": "BID",
        "id": "59452"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "date": "2013-04-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "date": "2013-04-25T10:55:01.570000",
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-04354"
      },
      {
        "date": "2013-04-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-61180"
      },
      {
        "date": "2013-04-24T00:00:00",
        "db": "BID",
        "id": "59452"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      },
      {
        "date": "2013-04-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-1178"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Cisco Run on product  Cisco NX-OS of  CDP Implementation buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002468"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-529"
      }
    ],
    "trust": 0.6
  }
}

CVE-2014-3261 (GCVE-0-2014-3261)

Vulnerability from nvd – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:57.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-24T01:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3261",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3261",
    "datePublished": "2014-05-24T01:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:35:57.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1178 (GCVE-0-2013-1178)

Vulnerability from nvd – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-25T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1178",
    "datePublished": "2013-04-25T10:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:17:30.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3261 (GCVE-0-2014-3261)

Vulnerability from cvelistv5 – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:57.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-24T01:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3261",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3261",
    "datePublished": "2014-05-24T01:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:35:57.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1178 (GCVE-0-2013-1178)

Vulnerability from cvelistv5 – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-25T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1178",
    "datePublished": "2013-04-25T10:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:17:30.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}