Search criteria
6 vulnerabilities found for ascend_pipeline_router by lucent
CVE-2002-2148 (GCVE-0-2002-2148)
Vulnerability from cvelistv5 – Published: 2005-11-16 21:17 – Updated: 2024-09-16 22:52
VLAI?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "lucent-port9-information-disclosure(9704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/284650"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2148",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T22:52:13.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-0060 (GCVE-0-1999-0060)
Vulnerability from cvelistv5 – Published: 1999-09-29 04:00 – Updated: 2024-08-01 16:27
VLAI?
Summary
Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T16:27:56.721Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ascend.com/2695.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T05:25:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ascend.com/2695.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-0060",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ascend.com/2695.html",
"refsource": "MISC",
"url": "http://www.ascend.com/2695.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-0060",
"datePublished": "1999-09-29T04:00:00",
"dateReserved": "1999-06-07T00:00:00",
"dateUpdated": "2024-08-01T16:27:56.721Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-2148 (GCVE-0-2002-2148)
Vulnerability from nvd – Published: 2005-11-16 21:17 – Updated: 2024-09-16 22:52
VLAI?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "lucent-port9-information-disclosure(9704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/284650"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2148",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T22:52:13.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-0060 (GCVE-0-1999-0060)
Vulnerability from nvd – Published: 1999-09-29 04:00 – Updated: 2024-08-01 16:27
VLAI?
Summary
Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T16:27:56.721Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ascend.com/2695.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T05:25:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ascend.com/2695.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-0060",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ascend.com/2695.html",
"refsource": "MISC",
"url": "http://www.ascend.com/2695.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-0060",
"datePublished": "1999-09-29T04:00:00",
"dateReserved": "1999-06-07T00:00:00",
"dateUpdated": "2024-08-01T16:27:56.721Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2002-2148
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| lucent | ascend_max_router | 2.0 | |
| lucent | ascend_max_router | 3.0 | |
| lucent | ascend_max_router | 4.0 | |
| lucent | ascend_max_router | 5.0 | |
| lucent | ascend_max_router | 5.0_ap48 | |
| lucent | ascend_pipeline_router | 1.0 | |
| lucent | ascend_pipeline_router | 2.0 | |
| lucent | ascend_pipeline_router | 3.0 | |
| lucent | ascend_pipeline_router | 4.0 | |
| lucent | ascend_pipeline_router | 5.0 | |
| lucent | ascend_pipeline_router | 6.0 | |
| lucent | ascend_pipeline_router | 6.0.2 | |
| lucent | dslterminator | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98D08C67-F634-41DB-AB33-B029A4AB9417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C90F2EE-AE20-4D17-9DC9-01C84BBE7696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A06F55-2174-4825-A348-A6D65F94C7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "627B08BB-DC4E-49F3-AE22-CD50906FB337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:5.0_ap48:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2DD62A-F471-4664-98F7-FDCCEAEB7F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2DCBCB-4B58-4463-B8D5-DABC654AD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "703FD9A7-8E68-4DC8-B4C6-346BDED1FEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D064ECCA-FFBA-4932-9803-5F939B9451ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF57770-EC66-4E2B-8A8C-817854BCBBB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3583D347-AED3-4469-8D36-1C873A7E4459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D182FD25-327B-4B7C-89B3-5A91053C5666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCA3F19-31BF-4E92-ABC1-75148D6298EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:dslterminator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C20CA752-C161-465B-A4AC-D25165F8E7EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"id": "CVE-2002-2148",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://online.securityfocus.com/archive/1/284650"
},
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://online.securityfocus.com/archive/1/284650"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/5335"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-1999-0060
Vulnerability from fkie_nvd - Published: 1998-03-16 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| lucent | ascend_max_router | 1.0 | |
| lucent | ascend_max_router | 2.0 | |
| lucent | ascend_max_router | 3.0 | |
| lucent | ascend_max_router | 4.0 | |
| lucent | ascend_max_router | 5.0 | |
| lucent | ascend_pipeline_router | 1.0 | |
| lucent | ascend_pipeline_router | 2.0 | |
| lucent | ascend_pipeline_router | 3.0 | |
| lucent | ascend_pipeline_router | 4.0 | |
| lucent | ascend_pipeline_router | 5.0 | |
| lucent | ascend_pipeline_router | 6.0 | |
| lucent | ascend_tnt_router | 1.0 | |
| lucent | ascend_tnt_router | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD46C3E-83EE-4DD4-A925-59A6F839EE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98D08C67-F634-41DB-AB33-B029A4AB9417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C90F2EE-AE20-4D17-9DC9-01C84BBE7696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A06F55-2174-4825-A348-A6D65F94C7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "627B08BB-DC4E-49F3-AE22-CD50906FB337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2DCBCB-4B58-4463-B8D5-DABC654AD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "703FD9A7-8E68-4DC8-B4C6-346BDED1FEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D064ECCA-FFBA-4932-9803-5F939B9451ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF57770-EC66-4E2B-8A8C-817854BCBBB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3583D347-AED3-4469-8D36-1C873A7E4459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D182FD25-327B-4B7C-89B3-5A91053C5666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_tnt_router:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ADBC4C-9CA8-4EEC-A91C-628A5C636282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_tnt_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75AB8E35-0610-4363-94B1-81C4F08C85C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."
}
],
"id": "CVE-1999-0060",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1998-03-16T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.ascend.com/2695.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ascend.com/2695.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}