Search criteria

21 vulnerabilities found for cisco_ios by cisco

FKIE_CVE-2015-4204

Vulnerability from fkie_nvd - Published: 2015-06-23 12:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Impacted products
Vendor Product Version
cisco cisco_ios 12.2
cisco cisco_ios 12.2\(33\)
cisco ubr10000_cable_modem_termination_system -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA07E584-C010-485F-8BE3-A46DA40B997E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2\\(33\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF0844A-5298-4470-80B8-0B82E67A359A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ubr10000_cable_modem_termination_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC98615A-29AC-454E-B4D9-222E8E85AD31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en Cisco IOS 12.2 en el m\u00f3dulo Performance Routing Engine (PRE) en los dispositivos uBR10000 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda del proceso PXF) mediante el env\u00edo r\u00e1pido de solicitudes de SNMP docsIfMCmtsMib, tambi\u00e9n conocida como Bug ID CSCue65051."
    }
  ],
  "id": "CVE-2015-4204",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-23T12:59:01.367",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75337"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/75337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032692"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0634

Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
psirt@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
psirt@cisco.comhttp://securitytracker.com/id?1021898
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/34241
psirt@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49424
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49585
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021898
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34241
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49424
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49585
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en  (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337."
    }
  ],
  "id": "CVE-2009-0634",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:02.063",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0633

Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
References
psirt@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
psirt@cisco.comhttp://securitytracker.com/id?1021898
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/34241
psirt@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49424
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021898
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34241
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49424
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en (1) la funcionalidad Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante paquetes MIPv6, conocido como Bug ID CSCsm97220."
    }
  ],
  "id": "CVE-2009-0633",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:02.030",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0628

Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
psirt@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
psirt@cisco.comhttp://securitytracker.com/id?1021896
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/34239
psirt@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49427
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021896
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34239
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49427
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB)."
    }
  ],
  "id": "CVE-2009-0628",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 8.5,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:01.967",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1152

Vulnerability from fkie_nvd - Published: 2008-03-27 17:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Impacted products
Vendor Product Version
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.1
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco ios 12.0
cisco ios 12.2yd
cisco ios 12.2yf
cisco ios 12.2yg
cisco ios 12.2yh

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:da:*:*:*:*:*:*",
              "matchCriteriaId": "225C93BF-8749-46AB-BAE7-9A67C7B99552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:db:*:*:*:*:*:*",
              "matchCriteriaId": "AD6138B2-1F13-4D98-B389-496E1F50FCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:dc:*:*:*:*:*:*",
              "matchCriteriaId": "33D056B2-CB1C-4287-A3E0-E0F985304969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
              "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sc:*:*:*:*:*:*",
              "matchCriteriaId": "EB1A7A2E-265F-4322-A6ED-4DD761497D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sl:*:*:*:*:*:*",
              "matchCriteriaId": "D2E8E311-8E6C-42FC-A662-799CC78E22FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sp:*:*:*:*:*:*",
              "matchCriteriaId": "2B02125C-1132-4748-9495-60BACFA2164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:st:*:*:*:*:*:*",
              "matchCriteriaId": "0FE78CB4-3CF1-4F0A-B4CA-6B6E33D1991D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sx:*:*:*:*:*:*",
              "matchCriteriaId": "B6680190-2688-48E2-BE31-A186A82AF79F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
              "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sz:*:*:*:*:*:*",
              "matchCriteriaId": "BB4F46A5-7561-4C17-BB15-F9A704DB1E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:t:*:*:*:*:*:*",
              "matchCriteriaId": "ACC2FCAE-6A56-4D45-A35F-CA2C2C7A4372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wc:*:*:*:*:*:*",
              "matchCriteriaId": "8D10302E-76CE-4D65-9068-2657C1834215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wt:*:*:*:*:*:*",
              "matchCriteriaId": "48BABA92-17D7-419D-B25D-2DE914F12D91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xa:*:*:*:*:*:*",
              "matchCriteriaId": "607E42A0-D5BA-4B59-812F-44DC970202D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xb:*:*:*:*:*:*",
              "matchCriteriaId": "AA54B6EB-CA03-4209-ACA6-7AE6455B764A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xc:*:*:*:*:*:*",
              "matchCriteriaId": "DC811D5E-A2D1-4098-990F-06DEC9080276",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xd:*:*:*:*:*:*",
              "matchCriteriaId": "9C1A32C0-0809-4242-9D23-7F8887D8AFE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xe:*:*:*:*:*:*",
              "matchCriteriaId": "9048DB68-228A-4496-9FEC-514A65130DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xf:*:*:*:*:*:*",
              "matchCriteriaId": "6D2435B9-EFE4-4CA6-9E55-C9C050D579DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xg:*:*:*:*:*:*",
              "matchCriteriaId": "2929498A-BB56-48B2-9089-E6B602B81929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xh:*:*:*:*:*:*",
              "matchCriteriaId": "73BA6E1B-B6DC-404A-BF1D-5059EB2F7C16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xi:*:*:*:*:*:*",
              "matchCriteriaId": "B385E45E-FCBD-4574-88FD-E000F320BE6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xj:*:*:*:*:*:*",
              "matchCriteriaId": "2FC95E36-024E-487B-8190-E96745B590EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xk:*:*:*:*:*:*",
              "matchCriteriaId": "6A006524-45C0-4B11-82A3-0AF69374BD29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xl:*:*:*:*:*:*",
              "matchCriteriaId": "518AAECA-0455-4688-8937-2D4248962C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xm:*:*:*:*:*:*",
              "matchCriteriaId": "6EE54B6B-99F0-40B2-990C-950E08E05FBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xn:*:*:*:*:*:*",
              "matchCriteriaId": "F740871A-7E8C-4077-8DB0-9D54B18D4037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xo:*:*:*:*:*:*",
              "matchCriteriaId": "7D0B5D1A-016B-4017-B476-F66F6A82ABCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xq:*:*:*:*:*:*",
              "matchCriteriaId": "A7897C03-2EE4-42D5-9A70-9FD9DD025708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xr:*:*:*:*:*:*",
              "matchCriteriaId": "BA0D5F4E-21CC-464C-930A-4DB1C25DDA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xs:*:*:*:*:*:*",
              "matchCriteriaId": "54348563-5740-4EF0-AADA-B864F3A47277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xv:*:*:*:*:*:*",
              "matchCriteriaId": "A091E988-DA6B-4FC9-9899-86F97AA29C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xw:*:*:*:*:*:*",
              "matchCriteriaId": "39C863BC-B042-41C7-A15D-4D29CA8933CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:aa:*:*:*:*:*:*",
              "matchCriteriaId": "0AE43587-46FE-4930-84FB-689AFCC122E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ax:*:*:*:*:*:*",
              "matchCriteriaId": "A0D676A9-7110-4446-9503-73BA2A4F49BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:az:*:*:*:*:*:*",
              "matchCriteriaId": "437F70FE-58DD-4F92-8219-4B09AAFA6F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:b:*:*:*:*:*:*",
              "matchCriteriaId": "EC1D82C4-AA1B-492C-81A7-7D579687C684",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:c:*:*:*:*:*:*",
              "matchCriteriaId": "02045A97-7AF6-4308-95A1-F4AC47A75AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:cx:*:*:*:*:*:*",
              "matchCriteriaId": "0B560BA9-D8EF-4618-A909-1B779829E4DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:d:*:*:*:*:*:*",
              "matchCriteriaId": "5CB10E53-3177-4502-88DA-CA935403DADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:da:*:*:*:*:*:*",
              "matchCriteriaId": "A61E033B-EFDD-4ECC-A370-F85A8D8161D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:db:*:*:*:*:*:*",
              "matchCriteriaId": "90F4AB09-46FE-47F7-831D-863F5C296A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:dc:*:*:*:*:*:*",
              "matchCriteriaId": "22723E8E-18E9-45A4-A216-D7D2B4EC8A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
              "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ea:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F42F9-1760-4A97-ADAE-66E5FC0B81FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eb:*:*:*:*:*:*",
              "matchCriteriaId": "E92ACC7B-EB0E-4142-8397-3AF58C3E7406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ec:*:*:*:*:*:*",
              "matchCriteriaId": "EAC665EA-CFAF-4F69-B8F6-BBC7D869CA42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eo:*:*:*:*:*:*",
              "matchCriteriaId": "365D4890-2676-4C0D-9D64-95A07B10DA8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eu:*:*:*:*:*:*",
              "matchCriteriaId": "1B1705DD-7DA2-4203-96FD-2344BBF99A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ew:*:*:*:*:*:*",
              "matchCriteriaId": "660ED401-2B7F-477F-99BA-DC553D47A9D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ex:*:*:*:*:*:*",
              "matchCriteriaId": "D5F66FC9-7BBB-460A-9D50-E971F8F489AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ey:*:*:*:*:*:*",
              "matchCriteriaId": "83A2B33B-BD96-42D6-B455-C6877F8C5BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ez:*:*:*:*:*:*",
              "matchCriteriaId": "946C08B8-DB52-41F0-8963-FD865FDE4462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ga:*:*:*:*:*:*",
              "matchCriteriaId": "F4F4AC3A-F2B8-40FB-A11D-9B2F8F81F699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:gb:*:*:*:*:*:*",
              "matchCriteriaId": "5A7CEA79-0B95-4EA4-B07C-AE93A75BF7A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xa:*:*:*:*:*:*",
              "matchCriteriaId": "F6A42922-F82A-4F7E-AF58-CAC0FD3402BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xb:*:*:*:*:*:*",
              "matchCriteriaId": "11BD3E2A-45B6-4A50-81C0-5089138434C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xc:*:*:*:*:*:*",
              "matchCriteriaId": "C62A96DA-2A55-4B7B-9D66-19583B4FD63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xd:*:*:*:*:*:*",
              "matchCriteriaId": "DCE34BEA-83F6-4908-A71B-7850D2B964ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xe:*:*:*:*:*:*",
              "matchCriteriaId": "07B63B0A-1D38-4E5A-8D6E-5DE8F961E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3E856620-FF4D-48B6-BAD6-F85744185593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xg:*:*:*:*:*:*",
              "matchCriteriaId": "6D78F36C-02EF-4839-B361-999F0445F20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xh:*:*:*:*:*:*",
              "matchCriteriaId": "9EEB9ED5-A623-46F0-8386-35DA38BD5FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xi:*:*:*:*:*:*",
              "matchCriteriaId": "E2F6E880-FDB3-4888-95FC-8709444530E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xj:*:*:*:*:*:*",
              "matchCriteriaId": "27E31864-DE6C-48AF-A7B3-A66F63575ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xk:*:*:*:*:*:*",
              "matchCriteriaId": "48572A1B-3696-4C47-9E59-30BC221FDEFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xl:*:*:*:*:*:*",
              "matchCriteriaId": "C1AE04CB-E03D-4C29-A257-BFB9468F86CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xm:*:*:*:*:*:*",
              "matchCriteriaId": "78F6FFF6-F5B9-4539-A189-6EA4C2D122CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xp:*:*:*:*:*:*",
              "matchCriteriaId": "D8D5EFEF-F27A-429D-B005-BFC8D1D39FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xq:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B7BF-D52A-487E-ADCA-C2537CB5F36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xr:*:*:*:*:*:*",
              "matchCriteriaId": "35F77E17-F109-4CB7-8333-E0651FF2B5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xs:*:*:*:*:*:*",
              "matchCriteriaId": "9AAD994B-C227-4D5A-B21A-51C44EEB4798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xt:*:*:*:*:*:*",
              "matchCriteriaId": "FD3ABECA-25E5-4D10-B319-354F1C202C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xv:*:*:*:*:*:*",
              "matchCriteriaId": "D50BD3AD-BCDC-4271-BFE1-D81DCE4106BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xw:*:*:*:*:*:*",
              "matchCriteriaId": "91A12162-E442-4FA4-9CCA-67F910582D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xx:*:*:*:*:*:*",
              "matchCriteriaId": "92EF445D-F19B-44F6-A878-6409D4E28FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xy:*:*:*:*:*:*",
              "matchCriteriaId": "A0FD7E21-2C42-49B8-98A1-CB2E6DC6B3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xz:*:*:*:*:*:*",
              "matchCriteriaId": "05E1A96A-D29D-4D57-B40A-EB12A40116A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ya:*:*:*:*:*:*",
              "matchCriteriaId": "59EE8734-9650-4B38-B62B-6A0ADF6E7BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yb:*:*:*:*:*:*",
              "matchCriteriaId": "65351CCD-C47C-4035-88FB-616E05398C1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yc:*:*:*:*:*:*",
              "matchCriteriaId": "A28DF3F1-6788-4F7D-87CC-DEEA8D8F3205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yd:*:*:*:*:*:*",
              "matchCriteriaId": "FA52C637-B9B1-4B3F-924F-A7D5286F816C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ye:*:*:*:*:*:*",
              "matchCriteriaId": "81CF042A-391D-496B-8317-65CA10FEED03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yf:*:*:*:*:*:*",
              "matchCriteriaId": "5C010477-1440-4B0F-937B-399D3A4535A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yh:*:*:*:*:*:*",
              "matchCriteriaId": "675A9670-F046-4840-9B0B-E384046C4324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yi:*:*:*:*:*:*",
              "matchCriteriaId": "C67EBC40-4D6E-4126-B044-BC1F215E868C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yj:*:*:*:*:*:*",
              "matchCriteriaId": "FD317149-C33D-4139-AAA1-878005806645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:b:*:*:*:*:*:*",
              "matchCriteriaId": "91844D86-1C49-4FBE-8D8E-84A75586B1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bc:*:*:*:*:*:*",
              "matchCriteriaId": "A31E1599-C1D0-40C6-B18A-D0604BD109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bw:*:*:*:*:*:*",
              "matchCriteriaId": "64B4036B-5BDF-4D1C-A0B2-7252F24742E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:by:*:*:*:*:*:*",
              "matchCriteriaId": "C6CB71F1-6092-48C7-B715-7349F044360C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bz:*:*:*:*:*:*",
              "matchCriteriaId": "D86ED994-3F96-4380-A2BE-71FDD3CAE4A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cx:*:*:*:*:*:*",
              "matchCriteriaId": "74BFFADB-27F2-4C35-B5FC-9BAE1227EB51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cy:*:*:*:*:*:*",
              "matchCriteriaId": "EA13518D-B17B-4531-B0E5-866120506116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:da:*:*:*:*:*:*",
              "matchCriteriaId": "4BE495A4-E66B-4710-A554-D0FE9023E69D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dd:*:*:*:*:*:*",
              "matchCriteriaId": "B13A02F5-65F2-4DB5-8EB3-8A0B9F7884D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dx:*:*:*:*:*:*",
              "matchCriteriaId": "95224EB1-BD20-4AA4-AD35-7ADDD3049359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:eu:*:*:*:*:*:*",
              "matchCriteriaId": "1AFEA3F7-D9AD-4817-9F75-864221C88DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ew:*:*:*:*:*:*",
              "matchCriteriaId": "3013C05E-3A15-4FD8-943A-AAB36EB4FB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
              "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ex:*:*:*:*:*:*",
              "matchCriteriaId": "0CE16131-2E4C-49F5-91A0-820AACC6683C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ey:*:*:*:*:*:*",
              "matchCriteriaId": "D7BAF29F-1EB4-44F9-92C1-D3322D7C0B81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ez:*:*:*:*:*:*",
              "matchCriteriaId": "DAB50CF9-9392-425C-B56E-3576CF0F6989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:fz:*:*:*:*:*:*",
              "matchCriteriaId": "EA697982-AF54-432F-8CCA-481678DE56D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixa:*:*:*:*:*:*",
              "matchCriteriaId": "4DA9B310-0E8E-4BCD-8254-5B8835413D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixb:*:*:*:*:*:*",
              "matchCriteriaId": "1D3B1EB1-E066-42D3-A623-8FBBF42220F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixc:*:*:*:*:*:*",
              "matchCriteriaId": "D9631E85-B8BC-4F0A-AD9B-0DB668C1ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixd:*:*:*:*:*:*",
              "matchCriteriaId": "25EA7E2F-8C5C-486A-B03D-D0A2A6BB5B69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ja:*:*:*:*:*:*",
              "matchCriteriaId": "9215D716-E6F6-4AEE-8808-9398A4826F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mb:*:*:*:*:*:*",
              "matchCriteriaId": "7B70078D-2F0E-4B00-8AF9-E2641A37A59E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mc:*:*:*:*:*:*",
              "matchCriteriaId": "06F481C2-4714-4995-9ED6-766BF5EA5738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:s:*:*:*:*:*:*",
              "matchCriteriaId": "BFE5AEBE-EB53-43F0-857E-7B4EDC1A0ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
              "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sbc:*:*:*:*:*:*",
              "matchCriteriaId": "1D64DA55-828B-40B4-9320-423121B5F8CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:se:*:*:*:*:*:*",
              "matchCriteriaId": "04D4ED20-A74A-4553-8FAC-3DA57A6E7423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sea:*:*:*:*:*:*",
              "matchCriteriaId": "AFD7C0D7-FE22-4EAA-A21E-D393DD73C5C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seb:*:*:*:*:*:*",
              "matchCriteriaId": "2270E882-0B30-4948-B4E7-BA3E87DD7E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sec:*:*:*:*:*:*",
              "matchCriteriaId": "D1A0DD83-80AB-4B1C-A267-2CCC2D37D57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sed:*:*:*:*:*:*",
              "matchCriteriaId": "ED52280F-D956-4617-9AFC-2928CF8F93F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:see:*:*:*:*:*:*",
              "matchCriteriaId": "A2C0605F-4FC6-43AC-A349-F1BB0572304F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sef:*:*:*:*:*:*",
              "matchCriteriaId": "224BD2C9-6213-416F-88D2-5FAECC005802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seg:*:*:*:*:*:*",
              "matchCriteriaId": "5CB5F125-9124-4C37-8FC9-CC63CFE20AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
              "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
              "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sm:*:*:*:*:*:*",
              "matchCriteriaId": "5C0F2D29-F6E6-440E-B08C-8EED785878CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:so:*:*:*:*:*:*",
              "matchCriteriaId": "C04488E3-F13F-4CA5-B8AF-6951FB510086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
              "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
              "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:st:*:*:*:*:*:*",
              "matchCriteriaId": "80FB05B8-8BE5-4AE9-B018-DAB58034DC7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:su:*:*:*:*:*:*",
              "matchCriteriaId": "69DC7D98-2B14-425F-8F93-A8BEBD9D1AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sv:*:*:*:*:*:*",
              "matchCriteriaId": "90D0875E-837B-4F8A-92F8-1D2DD219570B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sw:*:*:*:*:*:*",
              "matchCriteriaId": "CF6A17FF-49C2-489A-AD7B-FD1B014A3EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxa:*:*:*:*:*:*",
              "matchCriteriaId": "C3E2ACD9-8623-4B0E-807A-CFC2900497E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
              "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
              "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sy:*:*:*:*:*:*",
              "matchCriteriaId": "764FEE81-E2BD-4E46-92D8-48FEC6A1B249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sz:*:*:*:*:*:*",
              "matchCriteriaId": "59E8E365-8A31-48EE-BE20-7FBE7E9B54B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:t:*:*:*:*:*:*",
              "matchCriteriaId": "9C3E10F8-62D6-4159-B883-C886FD0B63DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "FABE7C54-B03B-4D1E-BF40-C0F357567543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:uz:*:*:*:*:*:*",
              "matchCriteriaId": "9E4E6DF2-61BB-46AE-9B69-CCC899C9A38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xa:*:*:*:*:*:*",
              "matchCriteriaId": "B260F027-B463-490A-A067-D8324FE4871A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xb:*:*:*:*:*:*",
              "matchCriteriaId": "C4644F2D-A4F4-42D3-931B-EB3B0AC15D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xc:*:*:*:*:*:*",
              "matchCriteriaId": "FB43EBD8-3517-4399-B532-5B84BE96B2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xd:*:*:*:*:*:*",
              "matchCriteriaId": "F4C59703-BB87-459F-BA79-D22541CB73A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xe:*:*:*:*:*:*",
              "matchCriteriaId": "71F5830A-D8FA-4A21-B7CB-E8A1E6746E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xf:*:*:*:*:*:*",
              "matchCriteriaId": "114E0B28-5AD8-4FEC-A089-79017AAB33C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xg:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B4250-6044-43CF-84B1-53C4AE4ECC8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xh:*:*:*:*:*:*",
              "matchCriteriaId": "E1C04A14-709B-44B3-B189-F50A41AA4C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xi:*:*:*:*:*:*",
              "matchCriteriaId": "2C0EA3E0-6BFC-4A4A-ACFF-C38C3948B7E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xj:*:*:*:*:*:*",
              "matchCriteriaId": "1C911936-17C0-43BE-A956-3F60D9606DAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xk:*:*:*:*:*:*",
              "matchCriteriaId": "E1C06F44-E4A4-400B-AF91-7A4209733569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xl:*:*:*:*:*:*",
              "matchCriteriaId": "E5B2FACC-2958-4E2D-BADD-51550F1FA63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xm:*:*:*:*:*:*",
              "matchCriteriaId": "582B03D7-57A4-4E00-9B67-4DC2B4320DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xn:*:*:*:*:*:*",
              "matchCriteriaId": "8038D0FA-30FB-4BC1-A33D-6BE76C248D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xq:*:*:*:*:*:*",
              "matchCriteriaId": "F5B5177C-98A7-42FF-83A8-8DFE33B28595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xr:*:*:*:*:*:*",
              "matchCriteriaId": "19C09D13-4124-461C-9976-F7B141563532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xs:*:*:*:*:*:*",
              "matchCriteriaId": "EE8EBF0C-7C7B-4C12-8135-0AB9957B7E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xt:*:*:*:*:*:*",
              "matchCriteriaId": "09C89AB4-7060-401D-B8B1-A5969D843558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xu:*:*:*:*:*:*",
              "matchCriteriaId": "A365C1C0-B014-42C9-A8B3-9D0C967DC9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xv:*:*:*:*:*:*",
              "matchCriteriaId": "0A56B6C5-C50D-44CF-BF43-4EDEBDA19581",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xw:*:*:*:*:*:*",
              "matchCriteriaId": "D5AE6379-25CE-44A1-BA61-2461DB0C0E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ya:*:*:*:*:*:*",
              "matchCriteriaId": "907A6B20-721D-4756-840F-8A2EE776BDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yb:*:*:*:*:*:*",
              "matchCriteriaId": "DBD1A8F1-73AD-41A0-8426-158402875952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yc:*:*:*:*:*:*",
              "matchCriteriaId": "0D431519-F500-408D-A79D-DAE2DF2F3A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ye:*:*:*:*:*:*",
              "matchCriteriaId": "880952B0-E796-4C8A-9D28-900338B3C629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yj:*:*:*:*:*:*",
              "matchCriteriaId": "B5D19A29-3500-4D69-B55F-16F6AF04CF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yk:*:*:*:*:*:*",
              "matchCriteriaId": "ECD7F135-CFC7-42D4-A223-02D69B905E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yl:*:*:*:*:*:*",
              "matchCriteriaId": "AE54DF91-7757-4676-A497-2FDE4B039367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ym:*:*:*:*:*:*",
              "matchCriteriaId": "65F91BB4-5721-46B8-97D7-98467F7E1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yn:*:*:*:*:*:*",
              "matchCriteriaId": "582D94B0-5980-492A-A8BB-4C107521573C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yo:*:*:*:*:*:*",
              "matchCriteriaId": "A6DCA5A2-7CE2-4273-B548-AA63E8EBCA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yp:*:*:*:*:*:*",
              "matchCriteriaId": "5A3625CC-B081-41DF-9C18-921C67FB4D95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yq:*:*:*:*:*:*",
              "matchCriteriaId": "59DBDE9C-1898-4D8C-B63F-0F962FDEA23C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yr:*:*:*:*:*:*",
              "matchCriteriaId": "C072D406-81E6-4FA8-82AC-47033F3229D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ys:*:*:*:*:*:*",
              "matchCriteriaId": "06193800-DE6B-4014-99A2-AE9AAFC11F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yt:*:*:*:*:*:*",
              "matchCriteriaId": "A7ED5BF0-BC3A-467A-BF14-8FE3529FD6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yu:*:*:*:*:*:*",
              "matchCriteriaId": "AC94BEC7-F050-4679-9331-9B7F679B2196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yv:*:*:*:*:*:*",
              "matchCriteriaId": "9D21DF3F-4793-4F4A-94E7-C174EEC7CF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yx:*:*:*:*:*:*",
              "matchCriteriaId": "FD47D76A-7F35-4B38-B479-FDA1EB09C35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yy:*:*:*:*:*:*",
              "matchCriteriaId": "A82F0863-9143-4390-A9C0-19DDB06C176E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:za:*:*:*:*:*:*",
              "matchCriteriaId": "D86A8DA9-D114-4BBE-90DE-F643C12EFB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zb:*:*:*:*:*:*",
              "matchCriteriaId": "DF7E107F-4805-4832-A013-A35D374FF07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zc:*:*:*:*:*:*",
              "matchCriteriaId": "2223DB0D-E7DA-488A-96C2-8845946CEDA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zd:*:*:*:*:*:*",
              "matchCriteriaId": "5779F924-F313-427F-82F4-571E657B57F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ze:*:*:*:*:*:*",
              "matchCriteriaId": "9783B2B3-F735-4E96-8FAA-679D753CDC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zf:*:*:*:*:*:*",
              "matchCriteriaId": "748B610B-7659-431E-BCB9-B7B5E72C0E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zg:*:*:*:*:*:*",
              "matchCriteriaId": "98798701-533E-4255-9450-C6354B779EF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zh:*:*:*:*:*:*",
              "matchCriteriaId": "F69E5442-C31F-46C8-8911-F5B77437754A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zj:*:*:*:*:*:*",
              "matchCriteriaId": "E1D75842-3328-49A3-AC0E-C508CACE5C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
              "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zp:*:*:*:*:*:*",
              "matchCriteriaId": "FA06B835-2324-47D4-A04D-D01FFA069A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
              "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xl:*:*:*:*:*:*",
              "matchCriteriaId": "57C8EB63-52B5-4B16-8EA1-621790F70B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xm:*:*:*:*:*:*",
              "matchCriteriaId": "61C80F8B-ADE8-4289-8D87-02C6284D5A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xn:*:*:*:*:*:*",
              "matchCriteriaId": "3CBBBBD1-496B-4C31-80B8-C217E915F077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xt:*:*:*:*:*:*",
              "matchCriteriaId": "07ED91C2-B8ED-4AE7-8A37-82DB94EE28A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xv:*:*:*:*:*:*",
              "matchCriteriaId": "CBDA82BB-93D1-436C-9598-0AF3FAC8CD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
              "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xy:*:*:*:*:*:*",
              "matchCriteriaId": "8049D059-2A09-4820-A4F0-6B8D794606BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
              "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
              "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
    },
    {
      "lang": "es",
      "value": "El componente data-link switching (DLSw) en Cisco IOS 12.0 hasta 12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo o consumo de memoria) a trav\u00e9s de 91 paquetes manipulados del (1) puerto UDP 2067 o (2) protocolo IP."
    }
  ],
  "id": "CVE-2008-1152",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-27T17:44:00.000",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/28465"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1019712"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1153

Vulnerability from fkie_nvd - Published: 2008-03-27 10:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
psirt@cisco.comhttp://secunia.com/advisories/29507
psirt@cisco.comhttp://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtmlExploit, Patch
psirt@cisco.comhttp://www.kb.cert.org/vuls/id/936177US Government Resource
psirt@cisco.comhttp://www.securityfocus.com/bid/28461
psirt@cisco.comhttp://www.securitytracker.com/id?1019713
psirt@cisco.comhttp://www.us-cert.gov/cas/techalerts/TA08-087B.htmlUS Government Resource
psirt@cisco.comhttp://www.vupen.com/english/advisories/2008/1006/references
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41475
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29507
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtmlExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/936177US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28461
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019713
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-087B.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1006/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41475
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860
Impacted products
Vendor Product Version
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco ios 12.1
cisco ios 12.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
    },
    {
      "lang": "es",
      "value": "Cisco IOS versiones 12.1, 12.2, 12.3 y 12.4, con servicios UDP de IPv4 y el protocolo IPv6 habilitado, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del dispositivo y posible interfaz bloqueada) por medio de un paquete IPv6 dise\u00f1ado para el dispositivo."
    }
  ],
  "id": "CVE-2008-1153",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-27T10:44:00.000",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/936177"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/28461"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1019713"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/936177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1156

Vulnerability from fkie_nvd - Published: 2008-03-27 10:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Impacted products
Vendor Product Version
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco ios 12.0
cisco ios 12.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de la Red Privada Virtual Multicast (MVPN) en Cisco IOS 12.0, 12.2, 12.3, y 12.4 permite a atacantes remotos crear \"estados multicast extra en los routers core\" a trav\u00e9s de mensajes Multicast Distribution Tree (MDT) Data Join manipulados."
    }
  ],
  "id": "CVE-2008-1156",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-27T10:44:00.000",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/28464"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1019715"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1006/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        },
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2015-4204 (GCVE-0-2015-4204)

Vulnerability from cvelistv5 – Published: 2015-06-23 10:00 – Updated: 2024-08-06 06:04
VLAI?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1032692 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/75337 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:04:03.096Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032692",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032692"
          },
          {
            "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
          },
          {
            "name": "75337",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75337"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032692",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032692"
        },
        {
          "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
        },
        {
          "name": "75337",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75337"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-4204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032692",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032692"
            },
            {
              "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
            },
            {
              "name": "75337",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75337"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-4204",
    "datePublished": "2015-06-23T10:00:00",
    "dateReserved": "2015-06-04T00:00:00",
    "dateUpdated": "2024-08-06T06:04:03.096Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0634 (GCVE-0-2009-0634)

Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:12043",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-ha-dos(49585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:12043",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-ha-dos(49585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0634",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:12043",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
            },
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-ha-dos(49585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0634",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0633 (GCVE-0-2009-0633)

Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.037Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "oval:org.mitre.oval:def:12290",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "oval:org.mitre.oval:def:12290",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0633",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "oval:org.mitre.oval:def:12290",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0633",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0628 (GCVE-0-2009-0628)

Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "oval:org.mitre.oval:def:12092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
          },
          {
            "name": "34239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34239"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "1021896",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021896"
          },
          {
            "name": "ios-sslvpn-tcbleak-dos(49427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
          },
          {
            "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "oval:org.mitre.oval:def:12092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
        },
        {
          "name": "34239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34239"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "1021896",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021896"
        },
        {
          "name": "ios-sslvpn-tcbleak-dos(49427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
        },
        {
          "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "oval:org.mitre.oval:def:12092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
            },
            {
              "name": "34239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34239"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "1021896",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021896"
            },
            {
              "name": "ios-sslvpn-tcbleak-dos(49427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
            },
            {
              "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0628",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1152 (GCVE-0-2008-1152)

Vulnerability from cvelistv5 – Published: 2008-03-27 17:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.securitytracker.com/id?1019712 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/28465 vdb-entryx_refsource_BID
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.828Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019712",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019712"
          },
          {
            "name": "28465",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28465"
          },
          {
            "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "oval:org.mitre.oval:def:5821",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
          },
          {
            "name": "cisco-ios-dlsw-dos(41482)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019712",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019712"
        },
        {
          "name": "28465",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28465"
        },
        {
          "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "oval:org.mitre.oval:def:5821",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
        },
        {
          "name": "cisco-ios-dlsw-dos(41482)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1152",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019712",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019712"
            },
            {
              "name": "28465",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28465"
            },
            {
              "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "oval:org.mitre.oval:def:5821",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
            },
            {
              "name": "cisco-ios-dlsw-dos(41482)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1152",
    "datePublished": "2008-03-27T17:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1153 (GCVE-0-2008-1153)

Vulnerability from cvelistv5 – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/28461 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.securitytracker.com/id?1019713 vdb-entryx_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/936177 third-party-advisoryx_refsource_CERT-VN
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "oval:org.mitre.oval:def:5860",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
          },
          {
            "name": "cisco-ios-ipv6-dualstack-dos(41475)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
          },
          {
            "name": "28461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28461"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019713",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019713"
          },
          {
            "name": "VU#936177",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/936177"
          },
          {
            "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "oval:org.mitre.oval:def:5860",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
        },
        {
          "name": "cisco-ios-ipv6-dualstack-dos(41475)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
        },
        {
          "name": "28461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28461"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019713",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019713"
        },
        {
          "name": "VU#936177",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/936177"
        },
        {
          "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "oval:org.mitre.oval:def:5860",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
            },
            {
              "name": "cisco-ios-ipv6-dualstack-dos(41475)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
            },
            {
              "name": "28461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28461"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019713",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019713"
            },
            {
              "name": "VU#936177",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/936177"
            },
            {
              "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1153",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1156 (GCVE-0-2008-1156)

Vulnerability from cvelistv5 – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/28464 vdb-entryx_refsource_BID
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id?1019715 vdb-entryx_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "cisco-ios-mvpm-information-disclosure(41468)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
          },
          {
            "name": "28464",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28464"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "1019715",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019715"
          },
          {
            "name": "oval:org.mitre.oval:def:5648",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "cisco-ios-mvpm-information-disclosure(41468)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
        },
        {
          "name": "28464",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28464"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "1019715",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019715"
        },
        {
          "name": "oval:org.mitre.oval:def:5648",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "cisco-ios-mvpm-information-disclosure(41468)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
            },
            {
              "name": "28464",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28464"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "1019715",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019715"
            },
            {
              "name": "oval:org.mitre.oval:def:5648",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1156",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-4204 (GCVE-0-2015-4204)

Vulnerability from nvd – Published: 2015-06-23 10:00 – Updated: 2024-08-06 06:04
VLAI?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1032692 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/75337 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:04:03.096Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032692",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032692"
          },
          {
            "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
          },
          {
            "name": "75337",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75337"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032692",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032692"
        },
        {
          "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
        },
        {
          "name": "75337",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75337"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-4204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032692",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032692"
            },
            {
              "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
            },
            {
              "name": "75337",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75337"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-4204",
    "datePublished": "2015-06-23T10:00:00",
    "dateReserved": "2015-06-04T00:00:00",
    "dateUpdated": "2024-08-06T06:04:03.096Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0634 (GCVE-0-2009-0634)

Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:12043",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-ha-dos(49585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:12043",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-ha-dos(49585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0634",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:12043",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
            },
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-ha-dos(49585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0634",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0633 (GCVE-0-2009-0633)

Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.037Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "oval:org.mitre.oval:def:12290",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
          },
          {
            "name": "34241",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34241"
          },
          {
            "name": "1021898",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021898"
          },
          {
            "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
          },
          {
            "name": "ios-mobile-dos(49424)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "oval:org.mitre.oval:def:12290",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
        },
        {
          "name": "34241",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34241"
        },
        {
          "name": "1021898",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021898"
        },
        {
          "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
        },
        {
          "name": "ios-mobile-dos(49424)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0633",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "oval:org.mitre.oval:def:12290",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
            },
            {
              "name": "34241",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34241"
            },
            {
              "name": "1021898",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021898"
            },
            {
              "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
            },
            {
              "name": "ios-mobile-dos(49424)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0633",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0628 (GCVE-0-2009-0628)

Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "oval:org.mitre.oval:def:12092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
          },
          {
            "name": "34239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34239"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "1021896",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021896"
          },
          {
            "name": "ios-sslvpn-tcbleak-dos(49427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
          },
          {
            "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "oval:org.mitre.oval:def:12092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
        },
        {
          "name": "34239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34239"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "1021896",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021896"
        },
        {
          "name": "ios-sslvpn-tcbleak-dos(49427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
        },
        {
          "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "oval:org.mitre.oval:def:12092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
            },
            {
              "name": "34239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34239"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "1021896",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021896"
            },
            {
              "name": "ios-sslvpn-tcbleak-dos(49427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
            },
            {
              "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0628",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1152 (GCVE-0-2008-1152)

Vulnerability from nvd – Published: 2008-03-27 17:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.securitytracker.com/id?1019712 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/28465 vdb-entryx_refsource_BID
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.828Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019712",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019712"
          },
          {
            "name": "28465",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28465"
          },
          {
            "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "oval:org.mitre.oval:def:5821",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
          },
          {
            "name": "cisco-ios-dlsw-dos(41482)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019712",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019712"
        },
        {
          "name": "28465",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28465"
        },
        {
          "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "oval:org.mitre.oval:def:5821",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
        },
        {
          "name": "cisco-ios-dlsw-dos(41482)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1152",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019712",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019712"
            },
            {
              "name": "28465",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28465"
            },
            {
              "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "oval:org.mitre.oval:def:5821",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
            },
            {
              "name": "cisco-ios-dlsw-dos(41482)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1152",
    "datePublished": "2008-03-27T17:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1153 (GCVE-0-2008-1153)

Vulnerability from nvd – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/28461 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.securitytracker.com/id?1019713 vdb-entryx_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/936177 third-party-advisoryx_refsource_CERT-VN
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "oval:org.mitre.oval:def:5860",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
          },
          {
            "name": "cisco-ios-ipv6-dualstack-dos(41475)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
          },
          {
            "name": "28461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28461"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "1019713",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019713"
          },
          {
            "name": "VU#936177",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/936177"
          },
          {
            "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "oval:org.mitre.oval:def:5860",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
        },
        {
          "name": "cisco-ios-ipv6-dualstack-dos(41475)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
        },
        {
          "name": "28461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28461"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "1019713",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019713"
        },
        {
          "name": "VU#936177",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/936177"
        },
        {
          "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "oval:org.mitre.oval:def:5860",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
            },
            {
              "name": "cisco-ios-ipv6-dualstack-dos(41475)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
            },
            {
              "name": "28461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28461"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "1019713",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019713"
            },
            {
              "name": "VU#936177",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/936177"
            },
            {
              "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1153",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1156 (GCVE-0-2008-1156)

Vulnerability from nvd – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1006… vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.us-cert.gov/cas/techalerts/TA08-087B.html third-party-advisoryx_refsource_CERT
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/28464 vdb-entryx_refsource_BID
http://secunia.com/advisories/29507 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id?1019715 vdb-entryx_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1006/references"
          },
          {
            "name": "cisco-ios-mvpm-information-disclosure(41468)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
          },
          {
            "name": "TA08-087B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
          },
          {
            "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
          },
          {
            "name": "28464",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28464"
          },
          {
            "name": "29507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29507"
          },
          {
            "name": "1019715",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019715"
          },
          {
            "name": "oval:org.mitre.oval:def:5648",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ADV-2008-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1006/references"
        },
        {
          "name": "cisco-ios-mvpm-information-disclosure(41468)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
        },
        {
          "name": "TA08-087B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
        },
        {
          "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
        },
        {
          "name": "28464",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28464"
        },
        {
          "name": "29507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29507"
        },
        {
          "name": "1019715",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019715"
        },
        {
          "name": "oval:org.mitre.oval:def:5648",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2008-1156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1006/references"
            },
            {
              "name": "cisco-ios-mvpm-information-disclosure(41468)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
            },
            {
              "name": "TA08-087B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
            },
            {
              "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
            },
            {
              "name": "28464",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28464"
            },
            {
              "name": "29507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29507"
            },
            {
              "name": "1019715",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019715"
            },
            {
              "name": "oval:org.mitre.oval:def:5648",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2008-1156",
    "datePublished": "2008-03-27T10:00:00",
    "dateReserved": "2008-03-05T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}