SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Router/Bridge/Hub)  >   Cisco NX-OS Vendors:   Cisco
Cisco NX-OS Buffer Overflow in OTV GRE Processing Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1036946
SecurityTracker URL:  http://securitytracker.com/id/1036946
CVE Reference:   CVE-2016-1453   (Links to External Site)
Date:  Oct 5 2016
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Nexus 7000, 7700
Description:   A vulnerability was reported in Cisco NX-OS. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted packet header parameters in a UDP packet to the Overlay Transport Virtualization (OTV) interface trigger a buffer overflow in the generic routing encapsulation (GRE) implementation and cause the target OTV process to reload or execute arbitrary code.

The following Cisco products are affected:

Nexus 7000 Series Switches
Nexus 7700 Series Switches

The vendor has assigned bug ID CSCuy95701 to this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system or cause the target process to reload.
Solution:   The vendor has issued a fix (7.2(2)D1(1), 7.3(1)D1(1)).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv (Links to External Site)
Cause:   Boundary error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC