Unknown
CVE-2014-3261
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- cg-os cg4,
- cg-os cg4(1),
- cgr 1120 -,
- cgr 1240 -,
- nexus 3016q -,
- nexus 3048 -,
- nexus 3064t -,
- nexus 3064x -,
- nexus 3548 -,
- nexus 4001i -,
- nexus 5000 -,
- nexus 5010 -,
- nexus 5010p switch -,
- nexus 5020 -,
- nexus 5020p switch -,
- nexus 5548p -,
- nexus 5548up -,
- nexus 5596up -,
- nexus 7000 -,
- nexus 7000 10-slot -,
- nexus 7000 18-slot -,
- nexus 7000 9-slot -,
- nx-os -,
- nx-os 4.1.(2),
- nx-os 5.0,
- nx-os 5.0(2),
- nx-os 5.0(2)n1(1),
- nx-os 5.0(2)n2(1),
- nx-os 5.0(2)n2(1a),
- nx-os 5.0(2a),
- nx-os 5.0(3),
- nx-os 5.0(3)n1(1),
- nx-os 5.0(3)n1(1a),
- nx-os 5.0(3)n1(1b),
- nx-os 5.0(3)n1(1c),
- nx-os 5.0(3)n2(1),
- nx-os 5.0(3)n2(2),
- nx-os 5.0(3)n2(2a),
- nx-os 5.0(3)n2(2b),
- nx-os 5.0(3)u1(1a),
- nx-os 5.0(3)u1(1b),
- nx-os 5.0(3)u1(1d),
- nx-os 5.0(3)u1(2),
- nx-os 5.0(3)u1(2a),
- nx-os 5.0(3)u2(1),
- nx-os 5.0(3)u2(2),
- nx-os 5.0(3)u2(2a),
- nx-os 5.0(3)u2(2b),
- nx-os 5.0(3)u2(2c),
- nx-os 5.0(3)u2(2d),
- nx-os 5.0(3)u3(1),
- nx-os 5.0(3)u3(2),
- nx-os 5.0(3)u3(2a),
- nx-os 5.0(3)u3(2b),
- nx-os 5.0(3)u4(1),
- nx-os 5.0(3)u5(1),
- nx-os 5.0(3)u5(1a),
- nx-os 5.0(3)u5(1b),
- nx-os 5.0(3)u5(1c),
- nx-os 5.0(3)u5(1d),
- nx-os 5.0(3)u5(1e),
- nx-os 5.0(5),
- nx-os 5.1,
- nx-os 5.1(1),
- nx-os 5.1(1a),
- nx-os 5.1(2),
- nx-os 5.1(3),
- nx-os 5.2,
- nx-os 5.2(1),
- nx-os 5.2(3),
- unified computing system 6120xp fabric interconnect -,
- unified computing system 6140xp fabric interconnect -,
- unified computing system 6248up fabric interconnect -,
- unified computing system 6296up fabric interconnect -,
- unified computing system infrastructure and unified computing system software 1.4(1j)
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: