ID CISCO-CSCTJ17451-NXOS.NASL Type nessus Reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-02-02T00:00:00
Description
The remote Cisco Nexus device is affected by a denial of service
condition when processing 802.1Q tagged packets.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(69481);
script_version("1.9");
script_cvs_date("Date: 2019/10/29 10:38:39");
script_cve_id("CVE-2011-0355");
script_bugtraq_id(46247);
script_xref(name:"CISCO-BUG-ID", value:"CSCtj17451");
script_name(english:"Cisco Nexus 1000V VEM DoS (CSCtj17451)");
script_summary(english:"Checks the NX-OS version.");
script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security update.");
script_set_attribute(attribute:"description", value:
"The remote Cisco Nexus device is affected by a denial of service
condition when processing 802.1Q tagged packets.");
# https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?71ec326e");
# https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_2_1_s_v_1_4/release/notes/n1000v_rn.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ac81edc6");
script_set_attribute(attribute:"solution", value:"Upgrade to version 4.0(4)SV1(3c) or 4.2(1)SV1(4).");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os");
script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/04");
script_set_attribute(attribute:"patch_publication_date", value:"2011/02/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/08/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"CISCO");
script_dependencies("cisco_nxos_version.nasl");
script_require_keys("Host/Cisco/NX-OS/Version", "Host/Cisco/NX-OS/Model", "Host/Cisco/NX-OS/Device");
exit(0);
}
include("audit.inc");
include("cisco_func.inc");
device = get_kb_item_or_exit("Host/Cisco/NX-OS/Device");
model = get_kb_item_or_exit("Host/Cisco/NX-OS/Model");
version = get_kb_item_or_exit("Host/Cisco/NX-OS/Version");
# only affects Nexus 1000V systems
if (device != 'Nexus' || model !~ '^1000[Vv]$') audit(AUDIT_HOST_NOT, "affected");
flag = 0;
if (
version == "4.0(4)SV1(3b)" ||
version == "4.0(4)SV1(3a)" ||
version == "4.0(4)SV1(3)" ||
version == "4.0(4)SV1(2)" ||
version == "4.0(4)SV1(1)"
) flag++;
if (flag)
{
if (report_verbosity > 0)
{
report =
'\n Model : ' + device + ' ' + model +
'\n Installed version : ' + version +
'\n Fixed version : 4.0(4)SV1(3c) / 4.2(1)SV1(4)' +
'\n';
security_hole(port:0, extra:report);
}
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "CISCO-CSCTJ17451-NXOS.NASL", "bulletinFamily": "scanner", "title": "Cisco Nexus 1000V VEM DoS (CSCtj17451)", "description": "The remote Cisco Nexus device is affected by a denial of service\ncondition when processing 802.1Q tagged packets.", "published": "2013-08-13T00:00:00", "modified": "2021-02-02T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://www.tenable.com/plugins/nessus/69481", "reporter": "This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?71ec326e", "http://www.nessus.org/u?ac81edc6"], "cvelist": ["CVE-2011-0355"], "type": "nessus", "lastseen": "2021-02-01T01:36:25", "edition": 26, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-0355"]}, {"type": "vmware", "idList": ["VMSA-2011-0002"]}], "modified": "2021-02-01T01:36:25", "rev": 2}, "score": {"value": 6.3, "vector": "NONE", "modified": "2021-02-01T01:36:25", "rev": 2}, "vulnersScore": 6.3}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69481);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/10/29 10:38:39\");\n\n script_cve_id(\"CVE-2011-0355\");\n script_bugtraq_id(46247);\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCtj17451\");\n\n script_name(english:\"Cisco Nexus 1000V VEM DoS (CSCtj17451)\");\n script_summary(english:\"Checks the NX-OS version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote device is missing a vendor-supplied security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Cisco Nexus device is affected by a denial of service\ncondition when processing 802.1Q tagged packets.\");\n # https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?71ec326e\");\n # https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_2_1_s_v_1_4/release/notes/n1000v_rn.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ac81edc6\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to version 4.0(4)SV1(3c) or 4.2(1)SV1(4).\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:cisco:nx-os\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/02/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/13\");\n\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CISCO\");\n\n script_dependencies(\"cisco_nxos_version.nasl\");\n script_require_keys(\"Host/Cisco/NX-OS/Version\", \"Host/Cisco/NX-OS/Model\", \"Host/Cisco/NX-OS/Device\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"cisco_func.inc\");\n\ndevice = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Device\");\nmodel = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Model\");\nversion = get_kb_item_or_exit(\"Host/Cisco/NX-OS/Version\");\n\n# only affects Nexus 1000V systems\nif (device != 'Nexus' || model !~ '^1000[Vv]$') audit(AUDIT_HOST_NOT, \"affected\");\n\nflag = 0;\n\nif (\n version == \"4.0(4)SV1(3b)\" ||\n version == \"4.0(4)SV1(3a)\" ||\n version == \"4.0(4)SV1(3)\" ||\n version == \"4.0(4)SV1(2)\" ||\n version == \"4.0(4)SV1(1)\"\n) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Model : ' + device + ' ' + model +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 4.0(4)SV1(3c) / 4.2(1)SV1(4)' + \n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "CISCO", "pluginID": "69481", "cpe": ["cpe:/o:cisco:nx-os"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:50:58", "description": "Cisco Nexus 1000V Virtual Ethernet Module (VEM) 4.0(4) SV1(1) through SV1(3b), as used in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, does not properly handle dropped packets, which allows guest OS users to cause a denial of service (ESX or ESXi host OS crash) by sending an 802.1Q tagged packet over an access vEthernet port, aka Cisco Bug ID CSCtj17451.", "edition": 4, "cvss3": {}, "published": "2011-02-17T18:00:00", "title": "CVE-2011-0355", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-0355"], "modified": "2018-10-10T20:09:00", "cpe": ["cpe:/a:vmware:esxi:4.0", "cpe:/a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\)", "cpe:/a:vmware:esx:4.1", "cpe:/a:vmware:esx:4.0", "cpe:/a:vmware:esxi:4.1"], "id": "CVE-2011-0355", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0355", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\):sv1\\(2\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\):sv1\\(3\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\):sv1\\(3b\\):*:*:*:*:*:*", "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\):sv1\\(3a\\):*:*:*:*:*:*", "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:1000v_virtual_ethernet_module_\\(vem\\):4.0\\(4\\):sv1\\(1\\):*:*:*:*:*:*", "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*"]}], "vmware": [{"lastseen": "2019-11-06T16:05:43", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0355"], "description": "a. Cisco Nexus 1000V Virtual Ethernet Module denial of service \nThe Cisco Nexus 1000V Virtual Ethernet Module (VEM) is a virtual switch for ESX and ESXi. This switch can be added to ESX and ESXi where it replaces the VMware virtual switch and runs as part of the ESX and ESXi kernel. \n \nA flaw in the handling of dropped packets by Cisco Nexus 1000V VEM can cause ESX and ESXi to crash. \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-0355 to the issue. \n \nThe issue is addressed by Cisco in the following releases: \n\n * Cisco Nexus 1000V Virtual Ethernet Module Release 4.2(4) SV1(4)\n * Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3c)\nFor details refer to the release notes of these releases (see section 4 for links). \n \nVMware customers are only affected by this vulnerability if they have chosen to deploy the Cisco Nexus 1000V virtual switch as a replacement for the VMware vNetwork Standard Switch or the VMware vNetwork Distributed Switch. \n \nVMware has confirmed that the VMware vNetwork Standard Switch and the VMware vNetwork Distributed Switch are not affected by the vulnerability. \n \nThe issue is documented by Cisco in Cisco bug ID CSCtj17451 (see section 5 for a link).\n", "edition": 4, "modified": "2011-02-07T00:00:00", "published": "2011-02-07T00:00:00", "id": "VMSA-2011-0002", "href": "https://www.vmware.com/security/advisories/VMSA-2011-0002.html", "title": "Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi", "type": "vmware", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}