ID

VAR-201604-0049


CVE

CVE-2016-1339


TITLE

Cisco Unified Computing System Platform Emulator Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2016-002103

DESCRIPTION

Cisco Unified Computing System (UCS) Platform Emulator 2.5(2)TS4, 3.0(2c)A, and 3.0(2c)TS9 allows local users to gain privileges via crafted arguments on a ucspe-copy command line, aka Bug ID CSCux68832. Cisco Unified Computing System (UCS) Platform Emulator Contains a privileged vulnerability. A local attacker can exploit this issue to execute arbitrary commands on the underlying system. This issue being tracked by Cisco Bug ID CSCux68832. There is a command injection vulnerability in Cisco UCSPE, which is caused by the program not properly handling the ucspe-copy command line parameter. The following releases are affected: Cisco UCSPE Release 2.5(2)TS4, Release 3.0(2c)A, Release 3.0(2c)TS9

Trust: 1.98

sources: NVD: CVE-2016-1339 // JVNDB: JVNDB-2016-002103 // BID: 86070 // VULHUB: VHN-90158

AFFECTED PRODUCTS

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:2.5\(2\)ts4

Trust: 1.6

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:3.0\(2c\)a

Trust: 1.6

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:3.0\(2c\)ts9

Trust: 1.6

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:2.5(2)ts4

Trust: 0.8

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:3.0(2c)a

Trust: 0.8

vendor:ciscomodel:unified computing system platform emulatorscope:eqversion:3.0(2c)ts9

Trust: 0.8

sources: JVNDB: JVNDB-2016-002103 // CNNVD: CNNVD-201604-326 // NVD: CVE-2016-1339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1339
value: HIGH

Trust: 1.0

NVD: CVE-2016-1339
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201604-326
value: HIGH

Trust: 0.6

VULHUB: VHN-90158
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1339
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-90158
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1339
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-90158 // JVNDB: JVNDB-2016-002103 // CNNVD: CNNVD-201604-326 // NVD: CVE-2016-1339

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-90158 // JVNDB: JVNDB-2016-002103 // NVD: CVE-2016-1339

THREAT TYPE

local

Trust: 0.9

sources: BID: 86070 // CNNVD: CNNVD-201604-326

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201604-326

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002103

PATCH

title:cisco-sa-20160414-ucspe1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160414-ucspe1

Trust: 0.8

title:Cisco Unified Computing System Platform Emulator Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60970

Trust: 0.6

sources: JVNDB: JVNDB-2016-002103 // CNNVD: CNNVD-201604-326

EXTERNAL IDS

db:NVDid:CVE-2016-1339

Trust: 2.8

db:SECTRACKid:1035581

Trust: 1.1

db:JVNDBid:JVNDB-2016-002103

Trust: 0.8

db:CNNVDid:CNNVD-201604-326

Trust: 0.7

db:BIDid:86070

Trust: 0.4

db:VULHUBid:VHN-90158

Trust: 0.1

sources: VULHUB: VHN-90158 // BID: 86070 // JVNDB: JVNDB-2016-002103 // CNNVD: CNNVD-201604-326 // NVD: CVE-2016-1339

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160414-ucspe1

Trust: 1.7

url:http://www.securitytracker.com/id/1035581

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1339

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1339

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-90158 // BID: 86070 // JVNDB: JVNDB-2016-002103 // CNNVD: CNNVD-201604-326 // NVD: CVE-2016-1339

CREDITS

Jacob Baines of Tenable Network Security

Trust: 0.9

sources: BID: 86070 // CNNVD: CNNVD-201604-326

SOURCES

db:VULHUBid:VHN-90158
db:BIDid:86070
db:JVNDBid:JVNDB-2016-002103
db:CNNVDid:CNNVD-201604-326
db:NVDid:CVE-2016-1339

LAST UPDATE DATE

2025-04-13T23:35:05.164000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90158date:2016-07-29T00:00:00
db:BIDid:86070date:2016-04-14T00:00:00
db:JVNDBid:JVNDB-2016-002103date:2016-04-19T00:00:00
db:CNNVDid:CNNVD-201604-326date:2016-04-18T00:00:00
db:NVDid:CVE-2016-1339date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-90158date:2016-04-16T00:00:00
db:BIDid:86070date:2016-04-14T00:00:00
db:JVNDBid:JVNDB-2016-002103date:2016-04-19T00:00:00
db:CNNVDid:CNNVD-201604-326date:2016-04-15T00:00:00
db:NVDid:CVE-2016-1339date:2016-04-16T01:59:04.590