Lucene search

K
ciscoCiscoCISCO-SA-20130829-CVE-2013-3467
HistoryAug 29, 2013 - 7:48 p.m.

Cisco UCS 6100 Fabric Interconnect Memory Leak Denial of Service Vulnerability

2013-08-2919:48:49
tools.cisco.com
9

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:N/I:N/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the memory management when executing either the show monitor session all or show monitor session command-line interface (CLI) commands on the Cisco Unified Computing System (UCS) 6100 Series Fabric Interconnects could allow an authenticated, local attacker to trigger a memory leak.

The vulnerability is due to not releasing memory after execution of the CLI commands, if a Switched Port Analyzer (SPAN) session is not actually configured. An attacker could exploit this vulnerability by executing either the show monitor session all or the show monitor session locally on the device. An exploit could allow the attacker to cause the device to exhaust its memory and reset.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker would need to authenticate and have local access to the targeted device. These access requirements limit the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscounified_computing_systemMatchany
OR
ciscounified_computing_systemMatchany
VendorProductVersionCPE
ciscounified_computing_systemanycpe:2.3:h:cisco:unified_computing_system:any:*:*:*:*:*:*:*

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:N/I:N/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20130829-CVE-2013-3467