Cisco Nexus 3000 / 9000 Series GNU C Library (glibc) getaddrinfo() RCE (cisco-sa-20160218-glibc)

High Nessus Plugin ID 93480

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of Cisco NX-OS software running on the remote device is affected by a remote code execution vulnerability in the bundled version of the GNU C Library (glibc) due to a stack-based buffer overflow condition in the DNS resolver. An unauthenticated, remote attacker can exploit this, via a crafted DNS response that triggers a call to the getaddrinfo() function, to cause a denial of service condition or the execution of arbitrary code.

Solution

Upgrade to the relevant fixed version or install the relevant SMU patches referenced in Cisco bug ID CSCuy36553 / CSCuy38921.

See Also

http://www.nessus.org/u?ae76a668

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy36553

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy38921

http://www.nessus.org/u?94dd3376

Plugin Details

Severity: High

ID: 93480

File Name: cisco-CSCuy36553-nxos.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 2016/09/14

Updated: 2019/04/11

Dependencies: 66696

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Device, Host/Cisco/NX-OS/Model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/03/15

Vulnerability Publication Date: 2016/02/16

Reference Information

CVE: CVE-2015-7547

BID: 83265

CISCO-SA: cisco-sa-20160218-glibc

CISCO-BUG-ID: CSCuy36553, CSCuy38921

EDB-ID: 39454, 40339

CERT: 457759