Guest

Preview Tool

Cisco Bug: CSCus68764 - Nexus 9k: assess GHOST vulnerability in glibc (CVE-2015-0235)

Last Modified

Jul 19, 2017

Products (11)

  • Cisco Nexus 9000 Series Switches
  • Cisco Nexus 9516 Switch
  • Cisco Nexus 9396PX Switch
  • Cisco Nexus 9396TX Switch
  • Cisco Nexus 9504 Switch
  • Cisco Nexus 3164Q Switch
  • Cisco Nexus 9508 Switch
  • Cisco Nexus 9332PQ Switch
  • Cisco Nexus 93128TX Switch
  • Cisco Nexus 9372TX Switch
View all products in Bug Search Tool Login Required

Known Affected Releases

6.1(2)I3(3)

Description (partial)

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Under normal conditions the D9036 does not take hostnames as an input parameter.  This vulnerability is not exploitable remotely
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.