Cisco Nexus 3000 / 9000 Series GNU C Library (glibc) getaddrinfo() RCE (cisco-sa-20160218-glibc)

high Nessus Plugin ID 93480


The remote device is missing a vendor-supplied security patch.


The version of Cisco NX-OS software running on the remote device is affected by a remote code execution vulnerability in the bundled version of the GNU C Library (glibc) due to a stack-based buffer overflow condition in the DNS resolver. An unauthenticated, remote attacker can exploit this, via a crafted DNS response that triggers a call to the getaddrinfo() function, to cause a denial of service condition or the execution of arbitrary code.


Upgrade to the relevant fixed version or install the relevant SMU patches referenced in Cisco bug ID CSCuy36553 / CSCuy38921.

See Also

Plugin Details

Severity: High

ID: 93480

File Name: cisco-CSCuy36553-nxos.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 9/14/2016

Updated: 11/14/2019

Risk Information


Risk Factor: Critical

Score: 9


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

CVSS Score Source: CVE-2015-7547


Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Device, Host/Cisco/NX-OS/Model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/15/2016

Vulnerability Publication Date: 2/16/2016

Reference Information

CVE: CVE-2015-7547

BID: 83265

CISCO-SA: cisco-sa-20160218-glibc

CISCO-BUG-ID: CSCuy36553, CSCuy38921

EDB-ID: 39454, 40339

CERT: 457759