cnvd-2019-32064
Vulnerability from cnvd

Title: Cisco NX-OS Software资源管理错误漏洞

Description:

Cisco NX-OS Software是美国思科(Cisco)公司的一套交换机使用的数据中心级操作系统软件。

Cisco NX-OS Software中的Network Time Protocol (NTP)功能存在资源管理错误漏洞,远程攻击者可借助Mode 7 NTP数据包洪泛该设备利用该漏洞造成拒绝服务。

Severity:

Patch Name: Cisco NX-OS Software资源管理错误漏洞的补丁

Patch Description:

Cisco NX-OS Software是美国思科(Cisco)公司的一套交换机使用的数据中心级操作系统软件。

Cisco NX-OS Software中的Network Time Protocol (NTP)功能存在资源管理错误漏洞,远程攻击者可借助Mode 7 NTP数据包洪泛该设备利用该漏洞造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos

Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos

Impacted products
Name
['Cisco Nexus 3000 Series Switche', 'Cisco Nexus 6000 Series Switches', 'Cisco Nexus 7700 Series Switches', 'Cisco Nexus 5600 Platform Switches', 'Cisco Nexus 5500 Platform Switches', 'Cisco Nexus 3500 Platform Switches', 'Cisco Nexus 7000 Series Switches 0', 'Cisco Nexus 3600 Platform Switches', 'Cisco MDS 9000 Series Multilayer Switches', 'Cisco Nexus 9000 Series Switches', 'Cisco Nexus 9500 R-Series Switching Platform']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-1967",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-1967"
    }
  },
  "description": "Cisco NX-OS Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4ea4\u6362\u673a\u4f7f\u7528\u7684\u6570\u636e\u4e2d\u5fc3\u7ea7\u64cd\u4f5c\u7cfb\u7edf\u8f6f\u4ef6\u3002\n\nCisco NX-OS Software\u4e2d\u7684Network Time Protocol (NTP)\u529f\u80fd\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9Mode 7 NTP\u6570\u636e\u5305\u6d2a\u6cdb\u8be5\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Cisco",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-32064",
  "openTime": "2019-09-19",
  "patchDescription": "Cisco NX-OS Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4ea4\u6362\u673a\u4f7f\u7528\u7684\u6570\u636e\u4e2d\u5fc3\u7ea7\u64cd\u4f5c\u7cfb\u7edf\u8f6f\u4ef6\u3002\r\n\r\nCisco NX-OS Software\u4e2d\u7684Network Time Protocol (NTP)\u529f\u80fd\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9Mode 7 NTP\u6570\u636e\u5305\u6d2a\u6cdb\u8be5\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco NX-OS Software\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco Nexus 3000 Series Switche",
      "Cisco Nexus 6000 Series Switches",
      "Cisco Nexus 7700 Series Switches",
      "Cisco Nexus 5600 Platform Switches",
      "Cisco Nexus 5500 Platform Switches",
      "Cisco Nexus 3500 Platform Switches",
      "Cisco Nexus 7000 Series Switches 0",
      "Cisco Nexus 3600 Platform Switches",
      "Cisco MDS 9000 Series Multilayer Switches",
      "Cisco Nexus 9000 Series Switches",
      "Cisco Nexus 9500 R-Series Switching Platform"
    ]
  },
  "referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos",
  "serverity": "\u9ad8",
  "submitTime": "2019-08-29",
  "title": "Cisco NX-OS Software\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…