First published: Thu Feb 17 2011(Updated: )
Cisco Nexus 1000V Virtual Ethernet Module (VEM) 4.0(4) SV1(1) through SV1(3b), as used in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, does not properly handle dropped packets, which allows guest OS users to cause a denial of service (ESX or ESXi host OS crash) by sending an 802.1Q tagged packet over an access vEthernet port, aka Cisco Bug ID CSCtj17451.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco 1000v Virtual Ethernet Module (vem) | =4.0\(4\)-sv1\(1\) | |
Cisco 1000v Virtual Ethernet Module (vem) | =4.0\(4\)-sv1\(2\) | |
Cisco 1000v Virtual Ethernet Module (vem) | =4.0\(4\)-sv1\(3\) | |
Cisco 1000v Virtual Ethernet Module (vem) | =4.0\(4\)-sv1\(3a\) | |
Cisco 1000v Virtual Ethernet Module (vem) | =4.0\(4\)-sv1\(3b\) | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0355 has a medium severity level due to its potential to cause denial of service.
To mitigate CVE-2011-0355, it is recommended to upgrade to the latest version of the Cisco Nexus 1000V Virtual Ethernet Module or apply any available patches.
CVE-2011-0355 affects Cisco Nexus 1000V VEM versions 4.0(4) SV1(1) through SV1(3b) and VMware ESX and ESXi versions 4.0 and 4.1.
CVE-2011-0355 does not lead to complete system compromise but can cause a denial of service that crashes the host OS.
If patching is not possible for CVE-2011-0355, a temporary workaround is to minimize the use of tagged packets until a fix can be applied.