Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.103801 |
Category: | CISCO |
Title: | Multiple Cisco Nexus Devices IP Stack Remote Denial of Service Vulnerability |
Summary: | Multiple Cisco Nexus devices are prone to a denial-of-service;vulnerability. |
Description: | Summary: Multiple Cisco Nexus devices are prone to a denial-of-service vulnerability. Vulnerability Insight: Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches. Version 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches, and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991. Vulnerability Impact: An attacker can exploit this issue to cause the device to crash, denying service to legitimate users. Affected Software/OS: The following devices are affected: Cisco Nexus 1000V Cisco Nexus 5000 Cisco Nexus 7000 Solution: The vendor has released updates. Please see the referenced advisory for details. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
BugTraq ID: 52027 Common Vulnerability Exposure (CVE) ID: CVE-2012-0352 Cisco Security Advisory: 20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos |
Copyright | This script is Copyright (C) 2013 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |