All the vulnerabilites related to cisco - cisco_ios
cve-2009-0634
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:12043",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-ha-dos(49585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:12043",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-ha-dos(49585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0634",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:12043",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
            },
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-ha-dos(49585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0634",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-0628
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "oval:org.mitre.oval:def:12092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
          },
          {
            "name": "34239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34239"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "1021896",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021896"
          },
          {
            "name": "ios-sslvpn-tcbleak-dos(49427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
          },
          {
            "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "oval:org.mitre.oval:def:12092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
        },
        {
          "name": "34239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34239"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "1021896",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021896"
        },
        {
          "name": "ios-sslvpn-tcbleak-dos(49427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
        },
        {
          "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "oval:org.mitre.oval:def:12092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
            },
            {
              "name": "34239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34239"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "1021896",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021896"
            },
            {
              "name": "ios-sslvpn-tcbleak-dos(49427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
            },
            {
              "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0628",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1152
Vulnerability from cvelistv5
Published
2008-03-27 17:00
Modified
2024-08-07 08:08
Severity ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.828Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019712",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019712"
          },
          {
            "name": "28465",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28465"
          },
          {
            "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "oval:org.mitre.oval:def:5821",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
          },
          {
            "name": "cisco-ios-dlsw-dos(41482)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019712",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019712"
        },
        {
          "name": "28465",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28465"
        },
        {
          "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "oval:org.mitre.oval:def:5821",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
        },
        {
          "name": "cisco-ios-dlsw-dos(41482)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1152",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019712",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019712"
            },
            {
              "name": "28465",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28465"
            },
            {
              "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "oval:org.mitre.oval:def:5821",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
            },
            {
              "name": "cisco-ios-dlsw-dos(41482)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1152",
    "datePublished": "2008-03-27T17:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1153
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:08
Severity ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
http://www.vupen.com/english/advisories/2008/1006/referencesvdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/41475vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/28461vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA08-087B.htmlthird-party-advisory, x_refsource_CERT
http://www.securitytracker.com/id?1019713vdb-entry, x_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/936177third-party-advisory, x_refsource_CERT-VN
http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtmlvendor-advisory, x_refsource_CISCO
http://secunia.com/advisories/29507third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "oval:org.mitre.oval:def:5860",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
          },
          {
            "name": "cisco-ios-ipv6-dualstack-dos(41475)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
          },
          {
            "name": "28461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28461"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019713",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019713"
          },
          {
            "name": "VU#936177",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/936177"
          },
          {
            "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "oval:org.mitre.oval:def:5860",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
        },
        {
          "name": "cisco-ios-ipv6-dualstack-dos(41475)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
        },
        {
          "name": "28461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28461"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019713",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019713"
        },
        {
          "name": "VU#936177",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/936177"
        },
        {
          "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "oval:org.mitre.oval:def:5860",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
            },
            {
              "name": "cisco-ios-ipv6-dualstack-dos(41475)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
            },
            {
              "name": "28461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28461"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019713",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019713"
            },
            {
              "name": "VU#936177",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/936177"
            },
            {
              "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1153",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1156
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:08
Severity ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "cisco-ios-mvpm-information-disclosure(41468)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
          },
          {
            "name": "28464",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28464"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "1019715",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019715"
          },
          {
            "name": "oval:org.mitre.oval:def:5648",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "cisco-ios-mvpm-information-disclosure(41468)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
        },
        {
          "name": "28464",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28464"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "1019715",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019715"
        },
        {
          "name": "oval:org.mitre.oval:def:5648",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "cisco-ios-mvpm-information-disclosure(41468)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
            },
            {
              "name": "28464",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28464"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "1019715",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019715"
            },
            {
              "name": "oval:org.mitre.oval:def:5648",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1156",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-4204
Vulnerability from cvelistv5
Published
2015-06-23 10:00
Modified
2024-08-06 06:04
Severity ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
References
http://www.securitytracker.com/id/1032692vdb-entry, x_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.x?alertId=39440vendor-advisory, x_refsource_CISCO
http://www.securityfocus.com/bid/75337vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:04:03.096Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032692",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032692"
          },
          {
            "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
          },
          {
            "name": "75337",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75337"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032692",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032692"
        },
        {
          "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
        },
        {
          "name": "75337",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75337"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-4204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032692",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032692"
            },
            {
              "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
            },
            {
              "name": "75337",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75337"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-4204",
    "datePublished": "2015-06-23T10:00:00",
    "dateReserved": "2015-06-04T00:00:00",
    "dateUpdated": "2024-08-06T06:04:03.096Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-0633
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.037Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "oval:org.mitre.oval:def:12290",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "oval:org.mitre.oval:def:12290",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0633",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "oval:org.mitre.oval:def:12290",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0633",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-0960
Vulnerability from cvelistv5
Published
2008-06-10 18:00
Modified
2024-08-07 08:01
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380x_refsource_CONFIRM
http://secunia.com/advisories/35463third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30615third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT2163x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/1787/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30648third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/CTAR-7FBS8Qx_refsource_CONFIRM
http://secunia.com/advisories/32664third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1981/referencesvdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/1801/referencesvdb-entry, x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://lists.ingate.com/pipermail/productinfo/2008/000021.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/31351third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1788/referencesvdb-entry, x_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2008-282.htmx_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/29623vdb-entry, x_refsource_BID
http://secunia.com/advisories/31334third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2971vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/30626third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=127730470825399&w=2vendor-advisory, x_refsource_HP
http://www.vmware.com/security/advisories/VMSA-2008-0017.htmlx_refsource_MISC
http://www.openwall.com/lists/oss-security/2008/06/09/1mailing-list, x_refsource_MLIST
http://marc.info/?l=bugtraq&m=127730470825399&w=2vendor-advisory, x_refsource_HP
http://www.kb.cert.org/vuls/id/878044third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/30647third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1vendor-advisory, x_refsource_SUNALERT
http://www.securityfocus.com/archive/1/497962/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/1836/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/33003third-party-advisory, x_refsource_SECUNIA
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlvendor-advisory, x_refsource_CISCO
http://www.vupen.com/english/advisories/2008/2361vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31568third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31467third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://www.debian.org/security/2008/dsa-1663vendor-advisory, x_refsource_DEBIAN
http://www.us-cert.gov/cas/techalerts/TA08-162A.htmlthird-party-advisory, x_refsource_CERT
http://www.kb.cert.org/vuls/id/MIMG-7ETS87x_refsource_CONFIRM
http://www.ocert.org/advisories/ocert-2008-006.htmlx_refsource_MISC
http://rhn.redhat.com/errata/RHSA-2008-0528.htmlvendor-advisory, x_refsource_REDHAT
http://securityreason.com/securityalert/3933third-party-advisory, x_refsource_SREASON
http://www.redhat.com/support/errata/RHSA-2008-0529.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/30612third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30802third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=447974x_refsource_CONFIRM
http://www.vmware.com/security/advisories/VMSA-2008-0013.htmlx_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/MIMG-7ETS5Zx_refsource_CONFIRM
https://www.exploit-db.com/exploits/5790exploit, x_refsource_EXPLOIT-DB
http://www.vupen.com/english/advisories/2008/1797/referencesvdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200808-02.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/493218/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/30665third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.htmlvendor-advisory, x_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2008/1800/referencesvdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2008:118vendor-advisory, x_refsource_MANDRIVA
http://www.ubuntu.com/usn/usn-685-1vendor-advisory, x_refsource_UBUNTU
http://sourceforge.net/forum/forum.php?forum_id=833770x_refsource_CONFIRM
http://www.securitytracker.com/id?1020218vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/30596third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2009/1612vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30574third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:40.150Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
          },
          {
            "name": "35463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35463"
          },
          {
            "name": "30615",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30615"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT2163"
          },
          {
            "name": "ADV-2008-1787",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1787/references"
          },
          {
            "name": "30648",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30648"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
          },
          {
            "name": "32664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32664"
          },
          {
            "name": "ADV-2008-1981",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1981/references"
          },
          {
            "name": "ADV-2008-1801",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1801/references"
          },
          {
            "name": "SUSE-SA:2008:039",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
          },
          {
            "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
          },
          {
            "name": "31351",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31351"
          },
          {
            "name": "ADV-2008-1788",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1788/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
          },
          {
            "name": "FEDORA-2008-5215",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
          },
          {
            "name": "29623",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29623"
          },
          {
            "name": "31334",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31334"
          },
          {
            "name": "ADV-2008-2971",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2971"
          },
          {
            "name": "oval:org.mitre.oval:def:10820",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
          },
          {
            "name": "oval:org.mitre.oval:def:6414",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
          },
          {
            "name": "30626",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30626"
          },
          {
            "name": "SSRT080082",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
          },
          {
            "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
          },
          {
            "name": "HPSBMA02439",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
          },
          {
            "name": "VU#878044",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/878044"
          },
          {
            "name": "30647",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30647"
          },
          {
            "name": "238865",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
          },
          {
            "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
          },
          {
            "name": "ADV-2008-1836",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1836/references"
          },
          {
            "name": "33003",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33003"
          },
          {
            "name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
          },
          {
            "name": "ADV-2008-2361",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2361"
          },
          {
            "name": "31568",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31568"
          },
          {
            "name": "31467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31467"
          },
          {
            "name": "APPLE-SA-2008-06-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
          },
          {
            "name": "DSA-1663",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1663"
          },
          {
            "name": "TA08-162A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ocert.org/advisories/ocert-2008-006.html"
          },
          {
            "name": "RHSA-2008:0528",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
          },
          {
            "name": "3933",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3933"
          },
          {
            "name": "RHSA-2008:0529",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
          },
          {
            "name": "30612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30612"
          },
          {
            "name": "30802",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30802"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
          },
          {
            "name": "5790",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5790"
          },
          {
            "name": "ADV-2008-1797",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1797/references"
          },
          {
            "name": "GLSA-200808-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
          },
          {
            "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
          },
          {
            "name": "30665",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30665"
          },
          {
            "name": "FEDORA-2008-5218",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
          },
          {
            "name": "FEDORA-2008-5224",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
          },
          {
            "name": "ADV-2008-1800",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1800/references"
          },
          {
            "name": "MDVSA-2008:118",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
          },
          {
            "name": "USN-685-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-685-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
          },
          {
            "name": "1020218",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020218"
          },
          {
            "name": "30596",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30596"
          },
          {
            "name": "oval:org.mitre.oval:def:5785",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
          },
          {
            "name": "ADV-2009-1612",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1612"
          },
          {
            "name": "30574",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30574"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
        },
        {
          "name": "35463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35463"
        },
        {
          "name": "30615",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30615"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT2163"
        },
        {
          "name": "ADV-2008-1787",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1787/references"
        },
        {
          "name": "30648",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30648"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
        },
        {
          "name": "32664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32664"
        },
        {
          "name": "ADV-2008-1981",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1981/references"
        },
        {
          "name": "ADV-2008-1801",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1801/references"
        },
        {
          "name": "SUSE-SA:2008:039",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
        },
        {
          "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
        },
        {
          "name": "31351",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31351"
        },
        {
          "name": "ADV-2008-1788",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1788/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
        },
        {
          "name": "FEDORA-2008-5215",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
        },
        {
          "name": "29623",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29623"
        },
        {
          "name": "31334",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31334"
        },
        {
          "name": "ADV-2008-2971",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2971"
        },
        {
          "name": "oval:org.mitre.oval:def:10820",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
        },
        {
          "name": "oval:org.mitre.oval:def:6414",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
        },
        {
          "name": "30626",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30626"
        },
        {
          "name": "SSRT080082",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
        },
        {
          "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
        },
        {
          "name": "HPSBMA02439",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
        },
        {
          "name": "VU#878044",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/878044"
        },
        {
          "name": "30647",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30647"
        },
        {
          "name": "238865",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
        },
        {
          "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
        },
        {
          "name": "ADV-2008-1836",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1836/references"
        },
        {
          "name": "33003",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33003"
        },
        {
          "name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
        },
        {
          "name": "ADV-2008-2361",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2361"
        },
        {
          "name": "31568",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31568"
        },
        {
          "name": "31467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31467"
        },
        {
          "name": "APPLE-SA-2008-06-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
        },
        {
          "name": "DSA-1663",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1663"
        },
        {
          "name": "TA08-162A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ocert.org/advisories/ocert-2008-006.html"
        },
        {
          "name": "RHSA-2008:0528",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
        },
        {
          "name": "3933",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3933"
        },
        {
          "name": "RHSA-2008:0529",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
        },
        {
          "name": "30612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30612"
        },
        {
          "name": "30802",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30802"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
        },
        {
          "name": "5790",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5790"
        },
        {
          "name": "ADV-2008-1797",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1797/references"
        },
        {
          "name": "GLSA-200808-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
        },
        {
          "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
        },
        {
          "name": "30665",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30665"
        },
        {
          "name": "FEDORA-2008-5218",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
        },
        {
          "name": "FEDORA-2008-5224",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
        },
        {
          "name": "ADV-2008-1800",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1800/references"
        },
        {
          "name": "MDVSA-2008:118",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
        },
        {
          "name": "USN-685-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-685-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
        },
        {
          "name": "1020218",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020218"
        },
        {
          "name": "30596",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30596"
        },
        {
          "name": "oval:org.mitre.oval:def:5785",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
        },
        {
          "name": "ADV-2009-1612",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1612"
        },
        {
          "name": "30574",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30574"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2008-0960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
            },
            {
              "name": "35463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35463"
            },
            {
              "name": "30615",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30615"
            },
            {
              "name": "http://support.apple.com/kb/HT2163",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT2163"
            },
            {
              "name": "ADV-2008-1787",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1787/references"
            },
            {
              "name": "30648",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30648"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
            },
            {
              "name": "32664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32664"
            },
            {
              "name": "ADV-2008-1981",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1981/references"
            },
            {
              "name": "ADV-2008-1801",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1801/references"
            },
            {
              "name": "SUSE-SA:2008:039",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
            },
            {
              "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
              "refsource": "MLIST",
              "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
            },
            {
              "name": "31351",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31351"
            },
            {
              "name": "ADV-2008-1788",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1788/references"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
            },
            {
              "name": "FEDORA-2008-5215",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
            },
            {
              "name": "29623",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29623"
            },
            {
              "name": "31334",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31334"
            },
            {
              "name": "ADV-2008-2971",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2971"
            },
            {
              "name": "oval:org.mitre.oval:def:10820",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
            },
            {
              "name": "oval:org.mitre.oval:def:6414",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
            },
            {
              "name": "30626",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30626"
            },
            {
              "name": "SSRT080082",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
              "refsource": "MISC",
              "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
            },
            {
              "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
            },
            {
              "name": "HPSBMA02439",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
            },
            {
              "name": "VU#878044",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/878044"
            },
            {
              "name": "30647",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30647"
            },
            {
              "name": "238865",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
            },
            {
              "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
            },
            {
              "name": "ADV-2008-1836",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1836/references"
            },
            {
              "name": "33003",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33003"
            },
            {
              "name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
            },
            {
              "name": "ADV-2008-2361",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2361"
            },
            {
              "name": "31568",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31568"
            },
            {
              "name": "31467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31467"
            },
            {
              "name": "APPLE-SA-2008-06-30",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
            },
            {
              "name": "DSA-1663",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1663"
            },
            {
              "name": "TA08-162A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
            },
            {
              "name": "http://www.ocert.org/advisories/ocert-2008-006.html",
              "refsource": "MISC",
              "url": "http://www.ocert.org/advisories/ocert-2008-006.html"
            },
            {
              "name": "RHSA-2008:0528",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
            },
            {
              "name": "3933",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3933"
            },
            {
              "name": "RHSA-2008:0529",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
            },
            {
              "name": "30612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30612"
            },
            {
              "name": "30802",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30802"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
            },
            {
              "name": "5790",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5790"
            },
            {
              "name": "ADV-2008-1797",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1797/references"
            },
            {
              "name": "GLSA-200808-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
            },
            {
              "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
            },
            {
              "name": "30665",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30665"
            },
            {
              "name": "FEDORA-2008-5218",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
            },
            {
              "name": "FEDORA-2008-5224",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
            },
            {
              "name": "ADV-2008-1800",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1800/references"
            },
            {
              "name": "MDVSA-2008:118",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
            },
            {
              "name": "USN-685-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-685-1"
            },
            {
              "name": "http://sourceforge.net/forum/forum.php?forum_id=833770",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
            },
            {
              "name": "1020218",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020218"
            },
            {
              "name": "30596",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30596"
            },
            {
              "name": "oval:org.mitre.oval:def:5785",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
            },
            {
              "name": "ADV-2009-1612",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1612"
            },
            {
              "name": "30574",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30574"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2008-0960",
    "datePublished": "2008-06-10T18:00:00",
    "dateReserved": "2008-02-25T00:00:00",
    "dateUpdated": "2024-08-07T08:01:40.150Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-03-27 17:44
Modified
2024-11-21 00:43
Severity ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Impacted products
Vendor Product Version
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco ios 12.0
cisco ios 12.2yd
cisco ios 12.2yf
cisco ios 12.2yg
cisco ios 12.2yh



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:da:*:*:*:*:*:*",
              "matchCriteriaId": "225C93BF-8749-46AB-BAE7-9A67C7B99552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:db:*:*:*:*:*:*",
              "matchCriteriaId": "AD6138B2-1F13-4D98-B389-496E1F50FCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:dc:*:*:*:*:*:*",
              "matchCriteriaId": "33D056B2-CB1C-4287-A3E0-E0F985304969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
              "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sc:*:*:*:*:*:*",
              "matchCriteriaId": "EB1A7A2E-265F-4322-A6ED-4DD761497D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sl:*:*:*:*:*:*",
              "matchCriteriaId": "D2E8E311-8E6C-42FC-A662-799CC78E22FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sp:*:*:*:*:*:*",
              "matchCriteriaId": "2B02125C-1132-4748-9495-60BACFA2164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:st:*:*:*:*:*:*",
              "matchCriteriaId": "0FE78CB4-3CF1-4F0A-B4CA-6B6E33D1991D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sx:*:*:*:*:*:*",
              "matchCriteriaId": "B6680190-2688-48E2-BE31-A186A82AF79F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
              "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sz:*:*:*:*:*:*",
              "matchCriteriaId": "BB4F46A5-7561-4C17-BB15-F9A704DB1E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:t:*:*:*:*:*:*",
              "matchCriteriaId": "ACC2FCAE-6A56-4D45-A35F-CA2C2C7A4372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wc:*:*:*:*:*:*",
              "matchCriteriaId": "8D10302E-76CE-4D65-9068-2657C1834215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wt:*:*:*:*:*:*",
              "matchCriteriaId": "48BABA92-17D7-419D-B25D-2DE914F12D91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xa:*:*:*:*:*:*",
              "matchCriteriaId": "607E42A0-D5BA-4B59-812F-44DC970202D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xb:*:*:*:*:*:*",
              "matchCriteriaId": "AA54B6EB-CA03-4209-ACA6-7AE6455B764A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xc:*:*:*:*:*:*",
              "matchCriteriaId": "DC811D5E-A2D1-4098-990F-06DEC9080276",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xd:*:*:*:*:*:*",
              "matchCriteriaId": "9C1A32C0-0809-4242-9D23-7F8887D8AFE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xe:*:*:*:*:*:*",
              "matchCriteriaId": "9048DB68-228A-4496-9FEC-514A65130DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xf:*:*:*:*:*:*",
              "matchCriteriaId": "6D2435B9-EFE4-4CA6-9E55-C9C050D579DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xg:*:*:*:*:*:*",
              "matchCriteriaId": "2929498A-BB56-48B2-9089-E6B602B81929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xh:*:*:*:*:*:*",
              "matchCriteriaId": "73BA6E1B-B6DC-404A-BF1D-5059EB2F7C16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xi:*:*:*:*:*:*",
              "matchCriteriaId": "B385E45E-FCBD-4574-88FD-E000F320BE6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xj:*:*:*:*:*:*",
              "matchCriteriaId": "2FC95E36-024E-487B-8190-E96745B590EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xk:*:*:*:*:*:*",
              "matchCriteriaId": "6A006524-45C0-4B11-82A3-0AF69374BD29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xl:*:*:*:*:*:*",
              "matchCriteriaId": "518AAECA-0455-4688-8937-2D4248962C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xm:*:*:*:*:*:*",
              "matchCriteriaId": "6EE54B6B-99F0-40B2-990C-950E08E05FBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xn:*:*:*:*:*:*",
              "matchCriteriaId": "F740871A-7E8C-4077-8DB0-9D54B18D4037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xo:*:*:*:*:*:*",
              "matchCriteriaId": "7D0B5D1A-016B-4017-B476-F66F6A82ABCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xq:*:*:*:*:*:*",
              "matchCriteriaId": "A7897C03-2EE4-42D5-9A70-9FD9DD025708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xr:*:*:*:*:*:*",
              "matchCriteriaId": "BA0D5F4E-21CC-464C-930A-4DB1C25DDA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xs:*:*:*:*:*:*",
              "matchCriteriaId": "54348563-5740-4EF0-AADA-B864F3A47277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xv:*:*:*:*:*:*",
              "matchCriteriaId": "A091E988-DA6B-4FC9-9899-86F97AA29C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xw:*:*:*:*:*:*",
              "matchCriteriaId": "39C863BC-B042-41C7-A15D-4D29CA8933CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:aa:*:*:*:*:*:*",
              "matchCriteriaId": "0AE43587-46FE-4930-84FB-689AFCC122E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ax:*:*:*:*:*:*",
              "matchCriteriaId": "A0D676A9-7110-4446-9503-73BA2A4F49BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:az:*:*:*:*:*:*",
              "matchCriteriaId": "437F70FE-58DD-4F92-8219-4B09AAFA6F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:b:*:*:*:*:*:*",
              "matchCriteriaId": "EC1D82C4-AA1B-492C-81A7-7D579687C684",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:c:*:*:*:*:*:*",
              "matchCriteriaId": "02045A97-7AF6-4308-95A1-F4AC47A75AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:cx:*:*:*:*:*:*",
              "matchCriteriaId": "0B560BA9-D8EF-4618-A909-1B779829E4DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:d:*:*:*:*:*:*",
              "matchCriteriaId": "5CB10E53-3177-4502-88DA-CA935403DADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:da:*:*:*:*:*:*",
              "matchCriteriaId": "A61E033B-EFDD-4ECC-A370-F85A8D8161D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:db:*:*:*:*:*:*",
              "matchCriteriaId": "90F4AB09-46FE-47F7-831D-863F5C296A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:dc:*:*:*:*:*:*",
              "matchCriteriaId": "22723E8E-18E9-45A4-A216-D7D2B4EC8A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
              "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ea:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F42F9-1760-4A97-ADAE-66E5FC0B81FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eb:*:*:*:*:*:*",
              "matchCriteriaId": "E92ACC7B-EB0E-4142-8397-3AF58C3E7406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ec:*:*:*:*:*:*",
              "matchCriteriaId": "EAC665EA-CFAF-4F69-B8F6-BBC7D869CA42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eo:*:*:*:*:*:*",
              "matchCriteriaId": "365D4890-2676-4C0D-9D64-95A07B10DA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eu:*:*:*:*:*:*",
              "matchCriteriaId": "1B1705DD-7DA2-4203-96FD-2344BBF99A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ew:*:*:*:*:*:*",
              "matchCriteriaId": "660ED401-2B7F-477F-99BA-DC553D47A9D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ex:*:*:*:*:*:*",
              "matchCriteriaId": "D5F66FC9-7BBB-460A-9D50-E971F8F489AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ey:*:*:*:*:*:*",
              "matchCriteriaId": "83A2B33B-BD96-42D6-B455-C6877F8C5BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ez:*:*:*:*:*:*",
              "matchCriteriaId": "946C08B8-DB52-41F0-8963-FD865FDE4462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "F4F4AC3A-F2B8-40FB-A11D-9B2F8F81F699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:gb:*:*:*:*:*:*",
              "matchCriteriaId": "5A7CEA79-0B95-4EA4-B07C-AE93A75BF7A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xa:*:*:*:*:*:*",
              "matchCriteriaId": "F6A42922-F82A-4F7E-AF58-CAC0FD3402BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xb:*:*:*:*:*:*",
              "matchCriteriaId": "11BD3E2A-45B6-4A50-81C0-5089138434C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xc:*:*:*:*:*:*",
              "matchCriteriaId": "C62A96DA-2A55-4B7B-9D66-19583B4FD63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xd:*:*:*:*:*:*",
              "matchCriteriaId": "DCE34BEA-83F6-4908-A71B-7850D2B964ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xe:*:*:*:*:*:*",
              "matchCriteriaId": "07B63B0A-1D38-4E5A-8D6E-5DE8F961E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3E856620-FF4D-48B6-BAD6-F85744185593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xg:*:*:*:*:*:*",
              "matchCriteriaId": "6D78F36C-02EF-4839-B361-999F0445F20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xh:*:*:*:*:*:*",
              "matchCriteriaId": "9EEB9ED5-A623-46F0-8386-35DA38BD5FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xi:*:*:*:*:*:*",
              "matchCriteriaId": "E2F6E880-FDB3-4888-95FC-8709444530E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xj:*:*:*:*:*:*",
              "matchCriteriaId": "27E31864-DE6C-48AF-A7B3-A66F63575ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xk:*:*:*:*:*:*",
              "matchCriteriaId": "48572A1B-3696-4C47-9E59-30BC221FDEFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xl:*:*:*:*:*:*",
              "matchCriteriaId": "C1AE04CB-E03D-4C29-A257-BFB9468F86CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xm:*:*:*:*:*:*",
              "matchCriteriaId": "78F6FFF6-F5B9-4539-A189-6EA4C2D122CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xp:*:*:*:*:*:*",
              "matchCriteriaId": "D8D5EFEF-F27A-429D-B005-BFC8D1D39FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xq:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B7BF-D52A-487E-ADCA-C2537CB5F36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xr:*:*:*:*:*:*",
              "matchCriteriaId": "35F77E17-F109-4CB7-8333-E0651FF2B5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xs:*:*:*:*:*:*",
              "matchCriteriaId": "9AAD994B-C227-4D5A-B21A-51C44EEB4798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xt:*:*:*:*:*:*",
              "matchCriteriaId": "FD3ABECA-25E5-4D10-B319-354F1C202C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xv:*:*:*:*:*:*",
              "matchCriteriaId": "D50BD3AD-BCDC-4271-BFE1-D81DCE4106BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xw:*:*:*:*:*:*",
              "matchCriteriaId": "91A12162-E442-4FA4-9CCA-67F910582D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xx:*:*:*:*:*:*",
              "matchCriteriaId": "92EF445D-F19B-44F6-A878-6409D4E28FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xy:*:*:*:*:*:*",
              "matchCriteriaId": "A0FD7E21-2C42-49B8-98A1-CB2E6DC6B3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xz:*:*:*:*:*:*",
              "matchCriteriaId": "05E1A96A-D29D-4D57-B40A-EB12A40116A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ya:*:*:*:*:*:*",
              "matchCriteriaId": "59EE8734-9650-4B38-B62B-6A0ADF6E7BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yb:*:*:*:*:*:*",
              "matchCriteriaId": "65351CCD-C47C-4035-88FB-616E05398C1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yc:*:*:*:*:*:*",
              "matchCriteriaId": "A28DF3F1-6788-4F7D-87CC-DEEA8D8F3205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yd:*:*:*:*:*:*",
              "matchCriteriaId": "FA52C637-B9B1-4B3F-924F-A7D5286F816C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ye:*:*:*:*:*:*",
              "matchCriteriaId": "81CF042A-391D-496B-8317-65CA10FEED03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yf:*:*:*:*:*:*",
              "matchCriteriaId": "5C010477-1440-4B0F-937B-399D3A4535A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yh:*:*:*:*:*:*",
              "matchCriteriaId": "675A9670-F046-4840-9B0B-E384046C4324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yi:*:*:*:*:*:*",
              "matchCriteriaId": "C67EBC40-4D6E-4126-B044-BC1F215E868C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yj:*:*:*:*:*:*",
              "matchCriteriaId": "FD317149-C33D-4139-AAA1-878005806645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:b:*:*:*:*:*:*",
              "matchCriteriaId": "91844D86-1C49-4FBE-8D8E-84A75586B1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bc:*:*:*:*:*:*",
              "matchCriteriaId": "A31E1599-C1D0-40C6-B18A-D0604BD109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bw:*:*:*:*:*:*",
              "matchCriteriaId": "64B4036B-5BDF-4D1C-A0B2-7252F24742E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:by:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB71F1-6092-48C7-B715-7349F044360C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bz:*:*:*:*:*:*",
              "matchCriteriaId": "D86ED994-3F96-4380-A2BE-71FDD3CAE4A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cx:*:*:*:*:*:*",
              "matchCriteriaId": "74BFFADB-27F2-4C35-B5FC-9BAE1227EB51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cy:*:*:*:*:*:*",
              "matchCriteriaId": "EA13518D-B17B-4531-B0E5-866120506116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:da:*:*:*:*:*:*",
              "matchCriteriaId": "4BE495A4-E66B-4710-A554-D0FE9023E69D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dd:*:*:*:*:*:*",
              "matchCriteriaId": "B13A02F5-65F2-4DB5-8EB3-8A0B9F7884D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dx:*:*:*:*:*:*",
              "matchCriteriaId": "95224EB1-BD20-4AA4-AD35-7ADDD3049359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:eu:*:*:*:*:*:*",
              "matchCriteriaId": "1AFEA3F7-D9AD-4817-9F75-864221C88DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ew:*:*:*:*:*:*",
              "matchCriteriaId": "3013C05E-3A15-4FD8-943A-AAB36EB4FB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
              "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ex:*:*:*:*:*:*",
              "matchCriteriaId": "0CE16131-2E4C-49F5-91A0-820AACC6683C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ey:*:*:*:*:*:*",
              "matchCriteriaId": "D7BAF29F-1EB4-44F9-92C1-D3322D7C0B81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ez:*:*:*:*:*:*",
              "matchCriteriaId": "DAB50CF9-9392-425C-B56E-3576CF0F6989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:fz:*:*:*:*:*:*",
              "matchCriteriaId": "EA697982-AF54-432F-8CCA-481678DE56D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixa:*:*:*:*:*:*",
              "matchCriteriaId": "4DA9B310-0E8E-4BCD-8254-5B8835413D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixb:*:*:*:*:*:*",
              "matchCriteriaId": "1D3B1EB1-E066-42D3-A623-8FBBF42220F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixc:*:*:*:*:*:*",
              "matchCriteriaId": "D9631E85-B8BC-4F0A-AD9B-0DB668C1ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixd:*:*:*:*:*:*",
              "matchCriteriaId": "25EA7E2F-8C5C-486A-B03D-D0A2A6BB5B69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ja:*:*:*:*:*:*",
              "matchCriteriaId": "9215D716-E6F6-4AEE-8808-9398A4826F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mb:*:*:*:*:*:*",
              "matchCriteriaId": "7B70078D-2F0E-4B00-8AF9-E2641A37A59E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mc:*:*:*:*:*:*",
              "matchCriteriaId": "06F481C2-4714-4995-9ED6-766BF5EA5738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:s:*:*:*:*:*:*",
              "matchCriteriaId": "BFE5AEBE-EB53-43F0-857E-7B4EDC1A0ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
              "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sbc:*:*:*:*:*:*",
              "matchCriteriaId": "1D64DA55-828B-40B4-9320-423121B5F8CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:se:*:*:*:*:*:*",
              "matchCriteriaId": "04D4ED20-A74A-4553-8FAC-3DA57A6E7423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sea:*:*:*:*:*:*",
              "matchCriteriaId": "AFD7C0D7-FE22-4EAA-A21E-D393DD73C5C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seb:*:*:*:*:*:*",
              "matchCriteriaId": "2270E882-0B30-4948-B4E7-BA3E87DD7E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sec:*:*:*:*:*:*",
              "matchCriteriaId": "D1A0DD83-80AB-4B1C-A267-2CCC2D37D57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sed:*:*:*:*:*:*",
              "matchCriteriaId": "ED52280F-D956-4617-9AFC-2928CF8F93F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:see:*:*:*:*:*:*",
              "matchCriteriaId": "A2C0605F-4FC6-43AC-A349-F1BB0572304F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sef:*:*:*:*:*:*",
              "matchCriteriaId": "224BD2C9-6213-416F-88D2-5FAECC005802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seg:*:*:*:*:*:*",
              "matchCriteriaId": "5CB5F125-9124-4C37-8FC9-CC63CFE20AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
              "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
              "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sm:*:*:*:*:*:*",
              "matchCriteriaId": "5C0F2D29-F6E6-440E-B08C-8EED785878CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:so:*:*:*:*:*:*",
              "matchCriteriaId": "C04488E3-F13F-4CA5-B8AF-6951FB510086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
              "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
              "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:st:*:*:*:*:*:*",
              "matchCriteriaId": "80FB05B8-8BE5-4AE9-B018-DAB58034DC7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:su:*:*:*:*:*:*",
              "matchCriteriaId": "69DC7D98-2B14-425F-8F93-A8BEBD9D1AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sv:*:*:*:*:*:*",
              "matchCriteriaId": "90D0875E-837B-4F8A-92F8-1D2DD219570B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sw:*:*:*:*:*:*",
              "matchCriteriaId": "CF6A17FF-49C2-489A-AD7B-FD1B014A3EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxa:*:*:*:*:*:*",
              "matchCriteriaId": "C3E2ACD9-8623-4B0E-807A-CFC2900497E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
              "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
              "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sy:*:*:*:*:*:*",
              "matchCriteriaId": "764FEE81-E2BD-4E46-92D8-48FEC6A1B249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sz:*:*:*:*:*:*",
              "matchCriteriaId": "59E8E365-8A31-48EE-BE20-7FBE7E9B54B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:t:*:*:*:*:*:*",
              "matchCriteriaId": "9C3E10F8-62D6-4159-B883-C886FD0B63DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "FABE7C54-B03B-4D1E-BF40-C0F357567543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:uz:*:*:*:*:*:*",
              "matchCriteriaId": "9E4E6DF2-61BB-46AE-9B69-CCC899C9A38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xa:*:*:*:*:*:*",
              "matchCriteriaId": "B260F027-B463-490A-A067-D8324FE4871A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xb:*:*:*:*:*:*",
              "matchCriteriaId": "C4644F2D-A4F4-42D3-931B-EB3B0AC15D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xc:*:*:*:*:*:*",
              "matchCriteriaId": "FB43EBD8-3517-4399-B532-5B84BE96B2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xd:*:*:*:*:*:*",
              "matchCriteriaId": "F4C59703-BB87-459F-BA79-D22541CB73A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xe:*:*:*:*:*:*",
              "matchCriteriaId": "71F5830A-D8FA-4A21-B7CB-E8A1E6746E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xf:*:*:*:*:*:*",
              "matchCriteriaId": "114E0B28-5AD8-4FEC-A089-79017AAB33C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xg:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B4250-6044-43CF-84B1-53C4AE4ECC8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xh:*:*:*:*:*:*",
              "matchCriteriaId": "E1C04A14-709B-44B3-B189-F50A41AA4C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xi:*:*:*:*:*:*",
              "matchCriteriaId": "2C0EA3E0-6BFC-4A4A-ACFF-C38C3948B7E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xj:*:*:*:*:*:*",
              "matchCriteriaId": "1C911936-17C0-43BE-A956-3F60D9606DAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xk:*:*:*:*:*:*",
              "matchCriteriaId": "E1C06F44-E4A4-400B-AF91-7A4209733569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xl:*:*:*:*:*:*",
              "matchCriteriaId": "E5B2FACC-2958-4E2D-BADD-51550F1FA63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xm:*:*:*:*:*:*",
              "matchCriteriaId": "582B03D7-57A4-4E00-9B67-4DC2B4320DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xn:*:*:*:*:*:*",
              "matchCriteriaId": "8038D0FA-30FB-4BC1-A33D-6BE76C248D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xq:*:*:*:*:*:*",
              "matchCriteriaId": "F5B5177C-98A7-42FF-83A8-8DFE33B28595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xr:*:*:*:*:*:*",
              "matchCriteriaId": "19C09D13-4124-461C-9976-F7B141563532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xs:*:*:*:*:*:*",
              "matchCriteriaId": "EE8EBF0C-7C7B-4C12-8135-0AB9957B7E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xt:*:*:*:*:*:*",
              "matchCriteriaId": "09C89AB4-7060-401D-B8B1-A5969D843558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xu:*:*:*:*:*:*",
              "matchCriteriaId": "A365C1C0-B014-42C9-A8B3-9D0C967DC9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xv:*:*:*:*:*:*",
              "matchCriteriaId": "0A56B6C5-C50D-44CF-BF43-4EDEBDA19581",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xw:*:*:*:*:*:*",
              "matchCriteriaId": "D5AE6379-25CE-44A1-BA61-2461DB0C0E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ya:*:*:*:*:*:*",
              "matchCriteriaId": "907A6B20-721D-4756-840F-8A2EE776BDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yb:*:*:*:*:*:*",
              "matchCriteriaId": "DBD1A8F1-73AD-41A0-8426-158402875952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yc:*:*:*:*:*:*",
              "matchCriteriaId": "0D431519-F500-408D-A79D-DAE2DF2F3A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ye:*:*:*:*:*:*",
              "matchCriteriaId": "880952B0-E796-4C8A-9D28-900338B3C629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yj:*:*:*:*:*:*",
              "matchCriteriaId": "B5D19A29-3500-4D69-B55F-16F6AF04CF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yk:*:*:*:*:*:*",
              "matchCriteriaId": "ECD7F135-CFC7-42D4-A223-02D69B905E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yl:*:*:*:*:*:*",
              "matchCriteriaId": "AE54DF91-7757-4676-A497-2FDE4B039367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ym:*:*:*:*:*:*",
              "matchCriteriaId": "65F91BB4-5721-46B8-97D7-98467F7E1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yn:*:*:*:*:*:*",
              "matchCriteriaId": "582D94B0-5980-492A-A8BB-4C107521573C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yo:*:*:*:*:*:*",
              "matchCriteriaId": "A6DCA5A2-7CE2-4273-B548-AA63E8EBCA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yp:*:*:*:*:*:*",
              "matchCriteriaId": "5A3625CC-B081-41DF-9C18-921C67FB4D95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yq:*:*:*:*:*:*",
              "matchCriteriaId": "59DBDE9C-1898-4D8C-B63F-0F962FDEA23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yr:*:*:*:*:*:*",
              "matchCriteriaId": "C072D406-81E6-4FA8-82AC-47033F3229D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ys:*:*:*:*:*:*",
              "matchCriteriaId": "06193800-DE6B-4014-99A2-AE9AAFC11F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yt:*:*:*:*:*:*",
              "matchCriteriaId": "A7ED5BF0-BC3A-467A-BF14-8FE3529FD6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yu:*:*:*:*:*:*",
              "matchCriteriaId": "AC94BEC7-F050-4679-9331-9B7F679B2196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yv:*:*:*:*:*:*",
              "matchCriteriaId": "9D21DF3F-4793-4F4A-94E7-C174EEC7CF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yx:*:*:*:*:*:*",
              "matchCriteriaId": "FD47D76A-7F35-4B38-B479-FDA1EB09C35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yy:*:*:*:*:*:*",
              "matchCriteriaId": "A82F0863-9143-4390-A9C0-19DDB06C176E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:za:*:*:*:*:*:*",
              "matchCriteriaId": "D86A8DA9-D114-4BBE-90DE-F643C12EFB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zb:*:*:*:*:*:*",
              "matchCriteriaId": "DF7E107F-4805-4832-A013-A35D374FF07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zc:*:*:*:*:*:*",
              "matchCriteriaId": "2223DB0D-E7DA-488A-96C2-8845946CEDA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zd:*:*:*:*:*:*",
              "matchCriteriaId": "5779F924-F313-427F-82F4-571E657B57F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ze:*:*:*:*:*:*",
              "matchCriteriaId": "9783B2B3-F735-4E96-8FAA-679D753CDC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zf:*:*:*:*:*:*",
              "matchCriteriaId": "748B610B-7659-431E-BCB9-B7B5E72C0E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zg:*:*:*:*:*:*",
              "matchCriteriaId": "98798701-533E-4255-9450-C6354B779EF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zh:*:*:*:*:*:*",
              "matchCriteriaId": "F69E5442-C31F-46C8-8911-F5B77437754A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zj:*:*:*:*:*:*",
              "matchCriteriaId": "E1D75842-3328-49A3-AC0E-C508CACE5C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
              "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zp:*:*:*:*:*:*",
              "matchCriteriaId": "FA06B835-2324-47D4-A04D-D01FFA069A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
              "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xl:*:*:*:*:*:*",
              "matchCriteriaId": "57C8EB63-52B5-4B16-8EA1-621790F70B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xm:*:*:*:*:*:*",
              "matchCriteriaId": "61C80F8B-ADE8-4289-8D87-02C6284D5A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xn:*:*:*:*:*:*",
              "matchCriteriaId": "3CBBBBD1-496B-4C31-80B8-C217E915F077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xt:*:*:*:*:*:*",
              "matchCriteriaId": "07ED91C2-B8ED-4AE7-8A37-82DB94EE28A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xv:*:*:*:*:*:*",
              "matchCriteriaId": "CBDA82BB-93D1-436C-9598-0AF3FAC8CD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
              "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xy:*:*:*:*:*:*",
              "matchCriteriaId": "8049D059-2A09-4820-A4F0-6B8D794606BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
              "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
              "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
    },
    {
      "lang": "es",
      "value": "El componente data-link switching (DLSw) en Cisco IOS 12.0 hasta 12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo o consumo de memoria) a trav\u00e9s de 91 paquetes manipulados del (1) puerto UDP 2067 o (2) protocolo IP."
    }
  ],
  "id": "CVE-2008-1152",
  "lastModified": "2024-11-21T00:43:48.110",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-27T17:44:00.000",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/28465"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1019712"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-06-23 12:59
Modified
2024-11-21 02:30
Severity ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Impacted products
Vendor Product Version
cisco cisco_ios 12.2
cisco cisco_ios 12.2\(33\)
cisco ubr10000_cable_modem_termination_system -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA07E584-C010-485F-8BE3-A46DA40B997E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2\\(33\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF0844A-5298-4470-80B8-0B82E67A359A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ubr10000_cable_modem_termination_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC98615A-29AC-454E-B4D9-222E8E85AD31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en Cisco IOS 12.2 en el m\u00f3dulo Performance Routing Engine (PRE) en los dispositivos uBR10000 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda del proceso PXF) mediante el env\u00edo r\u00e1pido de solicitudes de SNMP docsIfMCmtsMib, tambi\u00e9n conocida como Bug ID CSCue65051."
    }
  ],
  "id": "CVE-2015-4204",
  "lastModified": "2024-11-21T02:30:37.660",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-23T12:59:01.367",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75337"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032692"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-27 10:44
Modified
2024-11-21 00:43
Severity ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
ykramarz@cisco.comhttp://secunia.com/advisories/29507
ykramarz@cisco.comhttp://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtmlExploit, Patch
ykramarz@cisco.comhttp://www.kb.cert.org/vuls/id/936177US Government Resource
ykramarz@cisco.comhttp://www.securityfocus.com/bid/28461
ykramarz@cisco.comhttp://www.securitytracker.com/id?1019713
ykramarz@cisco.comhttp://www.us-cert.gov/cas/techalerts/TA08-087B.htmlUS Government Resource
ykramarz@cisco.comhttp://www.vupen.com/english/advisories/2008/1006/references
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41475
ykramarz@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29507
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtmlExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/936177US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28461
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019713
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-087B.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1006/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41475
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860
Impacted products
Vendor Product Version
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco ios 12.1
cisco ios 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
    },
    {
      "lang": "es",
      "value": "Cisco IOS versiones 12.1, 12.2, 12.3 y 12.4, con servicios UDP de IPv4 y el protocolo IPv6 habilitado, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del dispositivo y posible interfaz bloqueada) por medio de un paquete IPv6 dise\u00f1ado para el dispositivo."
    }
  ],
  "id": "CVE-2008-1153",
  "lastModified": "2024-11-21T00:43:48.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-27T10:44:00.000",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/936177"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/28461"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1019713"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/936177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-06-10 18:32
Modified
2024-11-21 00:43
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
cret@cert.orghttp://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
cret@cert.orghttp://lists.ingate.com/pipermail/productinfo/2008/000021.html
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
cret@cert.orghttp://marc.info/?l=bugtraq&m=127730470825399&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=127730470825399&w=2
cret@cert.orghttp://rhn.redhat.com/errata/RHSA-2008-0528.html
cret@cert.orghttp://secunia.com/advisories/30574Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30596Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30612
cret@cert.orghttp://secunia.com/advisories/30615Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30626Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30647Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30648Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30665Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30802Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31334Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31351Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31467Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31568Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/32664Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/33003Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/35463
cret@cert.orghttp://security.gentoo.org/glsa/glsa-200808-02.xml
cret@cert.orghttp://securityreason.com/securityalert/3933
cret@cert.orghttp://sourceforge.net/forum/forum.php?forum_id=833770
cret@cert.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
cret@cert.orghttp://support.apple.com/kb/HT2163
cret@cert.orghttp://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
cret@cert.orghttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlVendor Advisory
cret@cert.orghttp://www.debian.org/security/2008/dsa-1663Patch
cret@cert.orghttp://www.kb.cert.org/vuls/id/878044US Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/CTAR-7FBS8QUS Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/MIMG-7ETS5ZUS Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/MIMG-7ETS87US Government Resource
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:118
cret@cert.orghttp://www.ocert.org/advisories/ocert-2008-006.html
cret@cert.orghttp://www.openwall.com/lists/oss-security/2008/06/09/1
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2008-0529.html
cret@cert.orghttp://www.securityfocus.com/archive/1/493218/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/497962/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/bid/29623Exploit, Patch
cret@cert.orghttp://www.securitytracker.com/id?1020218
cret@cert.orghttp://www.ubuntu.com/usn/usn-685-1
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA08-162A.htmlUS Government Resource
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2008-0013.html
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2008-0017.html
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1787/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1788/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1797/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1800/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1801/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1836/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1981/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/2361
cret@cert.orghttp://www.vupen.com/english/advisories/2008/2971
cret@cert.orghttp://www.vupen.com/english/advisories/2009/1612
cret@cert.orghttps://bugzilla.redhat.com/show_bug.cgi?id=447974
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
cret@cert.orghttps://www.exploit-db.com/exploits/5790
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.ingate.com/pipermail/productinfo/2008/000021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127730470825399&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127730470825399&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0528.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30574Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30596Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30615Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30626Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30647Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30648Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30665Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30802Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31334Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31351Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31568Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32664Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33003Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35463
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-02.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3933
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/forum/forum.php?forum_id=833770
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT2163
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1663Patch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/878044US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/CTAR-7FBS8QUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MIMG-7ETS5ZUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MIMG-7ETS87US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:118
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/advisories/ocert-2008-006.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/06/09/1
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0529.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493218/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497962/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29623Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020218
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-685-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-162A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2008-0013.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2008-0017.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1787/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1788/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1797/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1800/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1801/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1836/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1981/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2361
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2971
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1612
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=447974
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5790
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
Impacted products
Vendor Product Version
cisco catos 7.1.1
cisco catos 7.3.1
cisco catos 7.4.1
cisco catos 8.3
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.1
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco ios 10.0
cisco ios 11.0
cisco ios 11.1
cisco ios 11.3
cisco ios 12.2
cisco ios_xr 2.0
cisco ios_xr 3.0
cisco ios_xr 3.2
cisco ios_xr 3.3
cisco ios_xr 3.4
cisco ios_xr 3.5
cisco ios_xr 3.6
cisco ios_xr 3.7
cisco nx_os 4.0
cisco nx_os 4.0.1
cisco nx_os 4.0.2
ecos_sourceware ecos 1.1
ecos_sourceware ecos 1.2.1
ecos_sourceware ecos 1.3.1
ecos_sourceware ecos 2.0
ecos_sourceware ecos 2.0
net-snmp net_snmp 5.0
net-snmp net_snmp 5.0.1
net-snmp net_snmp 5.0.2
net-snmp net_snmp 5.0.3
net-snmp net_snmp 5.0.4
net-snmp net_snmp 5.0.5
net-snmp net_snmp 5.0.6
net-snmp net_snmp 5.0.7
net-snmp net_snmp 5.0.8
net-snmp net_snmp 5.0.9
net-snmp net_snmp 5.1
net-snmp net_snmp 5.1.1
net-snmp net_snmp 5.1.2
net-snmp net_snmp 5.2
net-snmp net_snmp 5.3
net-snmp net_snmp 5.3.0.1
net-snmp net_snmp 5.4
sun solaris 10.0
sun sunos 5.10
cisco ace_10_6504_bundle_with_4_gbps_throughput *
cisco ace_10_6509_bundle_with_8_gbps_throughput *
cisco ace_10_service_module *
cisco ace_20_6504_bundle_with__4gbps_throughput *
cisco ace_20_6509_bundle_with_8gbps_throughput *
cisco ace_20_service_module *
cisco ace_4710 *
cisco ace_xml_gateway 5.2
cisco ace_xml_gateway 6.0
cisco mds_9120 *
cisco mds_9124 *
cisco mds_9134 *
cisco mds_9140 *
ingate ingate_firewall 2.2.0
ingate ingate_firewall 2.2.1
ingate ingate_firewall 2.2.2
ingate ingate_firewall 2.3.0
ingate ingate_firewall 2.4.0
ingate ingate_firewall 2.4.1
ingate ingate_firewall 2.5.0
ingate ingate_firewall 2.6.0
ingate ingate_firewall 2.6.1
ingate ingate_firewall 3.0.2
ingate ingate_firewall 3.1.0
ingate ingate_firewall 3.1.1
ingate ingate_firewall 3.1.3
ingate ingate_firewall 3.1.4
ingate ingate_firewall 3.2.0
ingate ingate_firewall 3.2.1
ingate ingate_firewall 3.2.2
ingate ingate_firewall 3.3.1
ingate ingate_firewall 4.1.0
ingate ingate_firewall 4.1.3
ingate ingate_firewall 4.2.1
ingate ingate_firewall 4.2.2
ingate ingate_firewall 4.2.3
ingate ingate_firewall 4.3.1
ingate ingate_firewall 4.4.1
ingate ingate_firewall 4.4.2
ingate ingate_firewall 4.5.1
ingate ingate_firewall 4.5.2
ingate ingate_firewall 4.6.0
ingate ingate_firewall 4.6.1
ingate ingate_firewall 4.6.2
ingate ingate_siparator 2.2.0
ingate ingate_siparator 2.2.1
ingate ingate_siparator 2.2.2
ingate ingate_siparator 2.3.0
ingate ingate_siparator 2.4.0
ingate ingate_siparator 2.4.1
ingate ingate_siparator 2.5.0
ingate ingate_siparator 2.6.0
ingate ingate_siparator 2.6.1
ingate ingate_siparator 3.0.2
ingate ingate_siparator 3.1.0
ingate ingate_siparator 3.1.1
ingate ingate_siparator 3.1.3
ingate ingate_siparator 3.1.4
ingate ingate_siparator 3.2.0
ingate ingate_siparator 3.2.1
ingate ingate_siparator 3.2.2
ingate ingate_siparator 3.3.1
ingate ingate_siparator 4.1.0
ingate ingate_siparator 4.1.3
ingate ingate_siparator 4.2.1
ingate ingate_siparator 4.2.2
ingate ingate_siparator 4.2.3
ingate ingate_siparator 4.3.1
ingate ingate_siparator 4.3.4
ingate ingate_siparator 4.4.1
ingate ingate_siparator 4.4.2
ingate ingate_siparator 4.5.1
ingate ingate_siparator 4.5.2
ingate ingate_siparator 4.6.0
ingate ingate_siparator 4.6.1
ingate ingate_siparator 4.6.2
juniper session_and_resource_control 1.0
juniper session_and_resource_control 2.0
juniper src_pe 1.0
juniper src_pe 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE64E4C4-BACE-404F-966D-415976781DC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "377F951F-C2D8-441D-A532-F62E23937F94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
              "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
              "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
              "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
              "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*",
              "matchCriteriaId": "EB593071-BB5A-47AD-B9C6-59D2010F6280",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
              "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
              "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
              "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
              "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
              "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*",
              "matchCriteriaId": "6E2D6402-D2AF-4817-8A46-1FA9B17B720C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
              "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
              "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*",
              "matchCriteriaId": "2A419BD7-6345-43D8-B69C-2255E2EF6FD7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
              "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
              "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
              "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D2BD63-C110-4E89-B239-4A59E20AB78E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6762126F-55E4-4963-99F5-206A46979E7C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1945B97A-8276-4EE2-8F76-5F0C0956DF18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2452913-0513-46BB-A52E-8FA12D77B570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "5D967624-23B1-48BB-91DB-1E1C18AAAD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930529-89BE-463D-8259-3D67D153284A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "743DEB17-3BE3-4278-A54B-2CE547DB9F31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BCA127-F5F3-418F-890D-6B1C03019590",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE83150C-456E-462A-A0F1-ED8EAD60D671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF5B2431-335C-461B-B07F-88267EA71DCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBA8E67-021A-4D07-94B9-943A8E1C4468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "905D1F04-CDFD-4BAD-8939-5ABC70A874E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00878E69-2721-43E3-A853-D3DCFE5C258D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C51799BB-D931-436C-8C94-558956AC880A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D498D406-A453-4119-BBA1-4709CF5862AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68555E-BEB9-4F1E-8D6D-C313FB501523",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B44A0D4-3020-414B-81D7-679E8441E182",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*",
              "matchCriteriaId": "B76A8BD4-E53F-49A6-946B-6E672DD0419C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C6B46B-13E2-4DA4-9EF2-007893034269",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D3471D-6267-4481-8BBD-BFC106E8F30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0292228-80D8-4BA4-8662-698D7003D7D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "522C9080-86A6-40A8-905C-73187DAF83F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1B7A18-F230-44D4-801E-8284085CA1DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E62CC4C-89A7-4594-BDD8-394211889220",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E152F995-BCD2-4725-A47C-1A5E7D6B9005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E38404-ED69-4B0E-A035-2AF5E0649CC1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0123D2ED-3983-45D3-B54A-3E75FCE99C6D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50E974E-87F5-45A2-88BA-B1E4913E3DAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AB25CC-BB96-4675-98D7-C5FF30C24014",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7C95AD-3D5F-458B-A761-5D7779FEA327",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E4A3F6-5D89-47D0-84AD-601682399D8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C700A36D-5FB4-475D-BE85-74511830870A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02060365-1D67-4611-8D79-B9FC354EBF99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "194BD880-F672-4492-8356-B14C8DA8C2DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1D769FC-3081-48F8-BBF1-3964F3F8B569",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A966DB26-8A52-4F4D-9C0E-8A8719A195AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6675DF0-963A-4091-9786-7CE3337EE47E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A94931-8584-4021-A5BB-83FF22D54955",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06FB120-9BB3-4363-B2A2-A3475993FDFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8229DE3A-B9CB-44FF-8409-51E09DDED479",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2699E7A6-7B3A-4C4C-9472-B8B6B547624D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D913348F-351C-4D78-A0AA-27B355D52235",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3E88A46-CEC7-46D5-9697-232E18531FD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ECFBAFE-9267-469A-A97F-F716969B247C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1559E6-E7B6-4B5B-8841-CF502E05BA46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F041246F-5B7F-4F63-9E81-02465C9062C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB78013-DEE9-438E-ABD1-5E3D932177BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77447C3-AA72-4CAB-A0B1-0883D41AD064",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C3F04F-7581-4DCA-970D-9FCBB56EA724",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABF04A7-8230-4AB9-8D66-DF1463037823",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC205E36-7027-4A9B-8574-9BB9C68007A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C55DD7-986A-4AB6-8F61-5A5D26531011",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "84DDD7E4-D5D7-4341-9482-2B918306578D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A3C59C-6A3D-477B-B425-1C085D6951E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AA57F4-5023-4333-9F19-C9D362E8E495",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "063034FF-0AB8-4D78-9822-0DCA9657C853",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67477EC7-363E-45B5-BA53-1A4E9FB20CDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E11F95-E635-465C-BD7F-5F7E9192DEAC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F145F0-573E-4CBC-AB69-3B77D6F9A540",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DA7D86-8845-43CA-80DC-3D794322CB28",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD34FEB-7956-44AE-A510-2E5F9EF61651",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEF5098-3791-4CEB-A436-2809A4385D27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D895880-FB98-4472-A164-458CE086F339",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7912AA3-0469-479E-9C5A-53F20E504956",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8677C6C8-39CA-492A-A196-9DFAF892120C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CE55DE-00CA-4F87-9CA0-80A360E332FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DC81FA-A6B4-41DC-8097-8944D06A2451",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB87853E-CAFF-48D8-9C56-A2DE325235D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E35451-BEE3-412A-8706-5522C00BE1DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F45326B3-CC4E-4C3A-9819-28936A0432F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDBF1A78-7190-4326-84BD-C18CC354DA38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97FFBA0-2E80-40EF-A4AC-F26D3490371E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A442F5B-5A1A-4CD0-B693-851FFB917E5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "646BF70F-CB7B-48E3-8563-E089E1CECD11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD34A7B-508C-45F2-8725-FE42398D3652",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2785732-A5C7-434E-B45D-13138B574F45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07E1241-24BE-48D3-B737-56B2AAA3AF64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB751FD-CCCA-4131-A24F-65DEF1128B26",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D106F4E4-4B41-4002-8C34-6A9C3A0FF640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "863583DC-DD93-46DC-BA06-0B838CDB2565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a  5.2.4.1,  versi\u00f3n  5.3.x anterior a  5.3.2.1 y  versi\u00f3n 5.4.x anterior a  5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series  versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP  versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall  versi\u00f3n  3.1.0 y posterior y SIParator  versi\u00f3n  3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent  versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte."
    }
  ],
  "id": "CVE-2008-0960",
  "lastModified": "2024-11-21T00:43:19.457",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-10T18:32:00.000",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30574"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30596"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/30612"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30615"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30626"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30647"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30648"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30665"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30802"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31334"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31351"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31467"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31568"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32664"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33003"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/35463"
    },
    {
      "source": "cret@cert.org",
      "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
    },
    {
      "source": "cret@cert.org",
      "url": "http://securityreason.com/securityalert/3933"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.apple.com/kb/HT2163"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1663"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/878044"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.ocert.org/advisories/ocert-2008-006.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29623"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1020218"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.ubuntu.com/usn/usn-685-1"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1787/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1788/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1797/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1800/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1801/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1836/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/1981/references"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/2361"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/2971"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/1612"
    },
    {
      "source": "cret@cert.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
    },
    {
      "source": "cret@cert.org",
      "url": "https://www.exploit-db.com/exploits/5790"
    },
    {
      "source": "cret@cert.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
    },
    {
      "source": "cret@cert.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
    },
    {
      "source": "cret@cert.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30615"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30665"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT2163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/878044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ocert.org/advisories/ocert-2008-006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-685-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1787/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1788/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1797/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1800/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1801/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1836/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1981/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2971"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
References
ykramarz@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
ykramarz@cisco.comhttp://securitytracker.com/id?1021898
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securityfocus.com/bid/34241
ykramarz@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49424
ykramarz@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021898
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34241
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49424
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en (1) la funcionalidad Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante paquetes MIPv6, conocido como Bug ID CSCsm97220."
    }
  ],
  "id": "CVE-2009-0633",
  "lastModified": "2024-11-21T01:00:34.133",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:02.030",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
ykramarz@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
ykramarz@cisco.comhttp://securitytracker.com/id?1021896
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securityfocus.com/bid/34239
ykramarz@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49427
ykramarz@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021896
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34239
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49427
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB)."
    }
  ],
  "id": "CVE-2009-0628",
  "lastModified": "2024-11-21T01:00:33.397",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 8.5,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:01.967",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-27 10:44
Modified
2024-11-21 00:43
Severity ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Impacted products
Vendor Product Version
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco ios 12.0
cisco ios 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de la Red Privada Virtual Multicast (MVPN) en Cisco IOS 12.0, 12.2, 12.3, y 12.4 permite a atacantes remotos crear \"estados multicast extra en los routers core\" a trav\u00e9s de mensajes Multicast Distribution Tree (MDT) Data Join manipulados."
    }
  ],
  "id": "CVE-2008-1156",
  "lastModified": "2024-11-21T00:43:48.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-27T10:44:00.000",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/28464"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1019715"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        },
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
ykramarz@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
ykramarz@cisco.comhttp://securitytracker.com/id?1021898
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securityfocus.com/bid/34241
ykramarz@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49424
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49585
ykramarz@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021898
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34241
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49424
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49585
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en  (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337."
    }
  ],
  "id": "CVE-2009-0634",
  "lastModified": "2024-11-21T01:00:34.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:02.063",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}