Cisco Nexus 3000 / 9000 Series GNU C Library (glibc) getaddrinfo() RCE (cisco-sa-20160218-glibc)

high Nessus Plugin ID 93480

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of Cisco NX-OS software running on the remote device is affected by a remote code execution vulnerability in the bundled version of the GNU C Library (glibc) due to a stack-based buffer overflow condition in the DNS resolver. An unauthenticated, remote attacker can exploit this, via a crafted DNS response that triggers a call to the getaddrinfo() function, to cause a denial of service condition or the execution of arbitrary code.

Solution

Upgrade to the relevant fixed version or install the relevant SMU patches referenced in Cisco bug ID CSCuy36553 / CSCuy38921.

See Also

http://www.nessus.org/u?ae76a668

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy36553

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy38921

http://www.nessus.org/u?94dd3376

Plugin Details

Severity: High

ID: 93480

File Name: cisco-CSCuy36553-nxos.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 9/14/2016

Updated: 11/14/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-7547

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/15/2016

Vulnerability Publication Date: 2/16/2016

Reference Information

CVE: CVE-2015-7547

BID: 83265