Search criteria
21 vulnerabilities found for cisco_ios by cisco
FKIE_CVE-2015-4204
Vulnerability from fkie_nvd - Published: 2015-06-23 12:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=39440 | Vendor Advisory | |
| psirt@cisco.com | http://www.securityfocus.com/bid/75337 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | http://www.securitytracker.com/id/1032692 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=39440 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75337 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032692 | Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EA07E584-C010-485F-8BE3-A46DA40B997E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2\\(33\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AF0844A-5298-4470-80B8-0B82E67A359A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ubr10000_cable_modem_termination_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC98615A-29AC-454E-B4D9-222E8E85AD31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
},
{
"lang": "es",
"value": "Fuga de memoria en Cisco IOS 12.2 en el m\u00f3dulo Performance Routing Engine (PRE) en los dispositivos uBR10000 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda del proceso PXF) mediante el env\u00edo r\u00e1pido de solicitudes de SNMP docsIfMCmtsMib, tambi\u00e9n conocida como Bug ID CSCue65051."
}
],
"id": "CVE-2015-4204",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-06-23T12:59:01.367",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/75337"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1032692"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/75337"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1032692"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0634
Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
"matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337."
}
],
"id": "CVE-2009-0634",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-27T16:30:02.063",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "psirt@cisco.com",
"url": "http://securitytracker.com/id?1021898"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1021898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0633
Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
"matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en (1) la funcionalidad Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante paquetes MIPv6, conocido como Bug ID CSCsm97220."
}
],
"id": "CVE-2009-0633",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-27T16:30:02.030",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "psirt@cisco.com",
"url": "http://securitytracker.com/id?1021898"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1021898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0628
Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
"matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
},
{
"lang": "es",
"value": "Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB)."
}
],
"id": "CVE-2009-0628",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 8.5,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-03-27T16:30:01.967",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "psirt@cisco.com",
"url": "http://securitytracker.com/id?1021896"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/34239"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1021896"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1152
Vulnerability from fkie_nvd - Published: 2008-03-27 17:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:da:*:*:*:*:*:*",
"matchCriteriaId": "225C93BF-8749-46AB-BAE7-9A67C7B99552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:db:*:*:*:*:*:*",
"matchCriteriaId": "AD6138B2-1F13-4D98-B389-496E1F50FCFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:dc:*:*:*:*:*:*",
"matchCriteriaId": "33D056B2-CB1C-4287-A3E0-E0F985304969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
"matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sc:*:*:*:*:*:*",
"matchCriteriaId": "EB1A7A2E-265F-4322-A6ED-4DD761497D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sl:*:*:*:*:*:*",
"matchCriteriaId": "D2E8E311-8E6C-42FC-A662-799CC78E22FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sp:*:*:*:*:*:*",
"matchCriteriaId": "2B02125C-1132-4748-9495-60BACFA2164D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:st:*:*:*:*:*:*",
"matchCriteriaId": "0FE78CB4-3CF1-4F0A-B4CA-6B6E33D1991D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sx:*:*:*:*:*:*",
"matchCriteriaId": "B6680190-2688-48E2-BE31-A186A82AF79F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
"matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sz:*:*:*:*:*:*",
"matchCriteriaId": "BB4F46A5-7561-4C17-BB15-F9A704DB1E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:t:*:*:*:*:*:*",
"matchCriteriaId": "ACC2FCAE-6A56-4D45-A35F-CA2C2C7A4372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wc:*:*:*:*:*:*",
"matchCriteriaId": "8D10302E-76CE-4D65-9068-2657C1834215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wt:*:*:*:*:*:*",
"matchCriteriaId": "48BABA92-17D7-419D-B25D-2DE914F12D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xa:*:*:*:*:*:*",
"matchCriteriaId": "607E42A0-D5BA-4B59-812F-44DC970202D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xb:*:*:*:*:*:*",
"matchCriteriaId": "AA54B6EB-CA03-4209-ACA6-7AE6455B764A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xc:*:*:*:*:*:*",
"matchCriteriaId": "DC811D5E-A2D1-4098-990F-06DEC9080276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xd:*:*:*:*:*:*",
"matchCriteriaId": "9C1A32C0-0809-4242-9D23-7F8887D8AFE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xe:*:*:*:*:*:*",
"matchCriteriaId": "9048DB68-228A-4496-9FEC-514A65130DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xf:*:*:*:*:*:*",
"matchCriteriaId": "6D2435B9-EFE4-4CA6-9E55-C9C050D579DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xg:*:*:*:*:*:*",
"matchCriteriaId": "2929498A-BB56-48B2-9089-E6B602B81929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xh:*:*:*:*:*:*",
"matchCriteriaId": "73BA6E1B-B6DC-404A-BF1D-5059EB2F7C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xi:*:*:*:*:*:*",
"matchCriteriaId": "B385E45E-FCBD-4574-88FD-E000F320BE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xj:*:*:*:*:*:*",
"matchCriteriaId": "2FC95E36-024E-487B-8190-E96745B590EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xk:*:*:*:*:*:*",
"matchCriteriaId": "6A006524-45C0-4B11-82A3-0AF69374BD29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xl:*:*:*:*:*:*",
"matchCriteriaId": "518AAECA-0455-4688-8937-2D4248962C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xm:*:*:*:*:*:*",
"matchCriteriaId": "6EE54B6B-99F0-40B2-990C-950E08E05FBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xn:*:*:*:*:*:*",
"matchCriteriaId": "F740871A-7E8C-4077-8DB0-9D54B18D4037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xo:*:*:*:*:*:*",
"matchCriteriaId": "7D0B5D1A-016B-4017-B476-F66F6A82ABCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xq:*:*:*:*:*:*",
"matchCriteriaId": "A7897C03-2EE4-42D5-9A70-9FD9DD025708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xr:*:*:*:*:*:*",
"matchCriteriaId": "BA0D5F4E-21CC-464C-930A-4DB1C25DDA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xs:*:*:*:*:*:*",
"matchCriteriaId": "54348563-5740-4EF0-AADA-B864F3A47277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xv:*:*:*:*:*:*",
"matchCriteriaId": "A091E988-DA6B-4FC9-9899-86F97AA29C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xw:*:*:*:*:*:*",
"matchCriteriaId": "39C863BC-B042-41C7-A15D-4D29CA8933CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:aa:*:*:*:*:*:*",
"matchCriteriaId": "0AE43587-46FE-4930-84FB-689AFCC122E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ax:*:*:*:*:*:*",
"matchCriteriaId": "A0D676A9-7110-4446-9503-73BA2A4F49BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:az:*:*:*:*:*:*",
"matchCriteriaId": "437F70FE-58DD-4F92-8219-4B09AAFA6F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:b:*:*:*:*:*:*",
"matchCriteriaId": "EC1D82C4-AA1B-492C-81A7-7D579687C684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:c:*:*:*:*:*:*",
"matchCriteriaId": "02045A97-7AF6-4308-95A1-F4AC47A75AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:cx:*:*:*:*:*:*",
"matchCriteriaId": "0B560BA9-D8EF-4618-A909-1B779829E4DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:d:*:*:*:*:*:*",
"matchCriteriaId": "5CB10E53-3177-4502-88DA-CA935403DADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:da:*:*:*:*:*:*",
"matchCriteriaId": "A61E033B-EFDD-4ECC-A370-F85A8D8161D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:db:*:*:*:*:*:*",
"matchCriteriaId": "90F4AB09-46FE-47F7-831D-863F5C296A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:dc:*:*:*:*:*:*",
"matchCriteriaId": "22723E8E-18E9-45A4-A216-D7D2B4EC8A93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
"matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ea:*:*:*:*:*:*",
"matchCriteriaId": "4B2F42F9-1760-4A97-ADAE-66E5FC0B81FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eb:*:*:*:*:*:*",
"matchCriteriaId": "E92ACC7B-EB0E-4142-8397-3AF58C3E7406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ec:*:*:*:*:*:*",
"matchCriteriaId": "EAC665EA-CFAF-4F69-B8F6-BBC7D869CA42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eo:*:*:*:*:*:*",
"matchCriteriaId": "365D4890-2676-4C0D-9D64-95A07B10DA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eu:*:*:*:*:*:*",
"matchCriteriaId": "1B1705DD-7DA2-4203-96FD-2344BBF99A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ew:*:*:*:*:*:*",
"matchCriteriaId": "660ED401-2B7F-477F-99BA-DC553D47A9D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ex:*:*:*:*:*:*",
"matchCriteriaId": "D5F66FC9-7BBB-460A-9D50-E971F8F489AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ey:*:*:*:*:*:*",
"matchCriteriaId": "83A2B33B-BD96-42D6-B455-C6877F8C5BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ez:*:*:*:*:*:*",
"matchCriteriaId": "946C08B8-DB52-41F0-8963-FD865FDE4462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ga:*:*:*:*:*:*",
"matchCriteriaId": "F4F4AC3A-F2B8-40FB-A11D-9B2F8F81F699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:gb:*:*:*:*:*:*",
"matchCriteriaId": "5A7CEA79-0B95-4EA4-B07C-AE93A75BF7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xa:*:*:*:*:*:*",
"matchCriteriaId": "F6A42922-F82A-4F7E-AF58-CAC0FD3402BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xb:*:*:*:*:*:*",
"matchCriteriaId": "11BD3E2A-45B6-4A50-81C0-5089138434C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xc:*:*:*:*:*:*",
"matchCriteriaId": "C62A96DA-2A55-4B7B-9D66-19583B4FD63A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xd:*:*:*:*:*:*",
"matchCriteriaId": "DCE34BEA-83F6-4908-A71B-7850D2B964ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xe:*:*:*:*:*:*",
"matchCriteriaId": "07B63B0A-1D38-4E5A-8D6E-5DE8F961E0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xf:*:*:*:*:*:*",
"matchCriteriaId": "3E856620-FF4D-48B6-BAD6-F85744185593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xg:*:*:*:*:*:*",
"matchCriteriaId": "6D78F36C-02EF-4839-B361-999F0445F20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xh:*:*:*:*:*:*",
"matchCriteriaId": "9EEB9ED5-A623-46F0-8386-35DA38BD5FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xi:*:*:*:*:*:*",
"matchCriteriaId": "E2F6E880-FDB3-4888-95FC-8709444530E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xj:*:*:*:*:*:*",
"matchCriteriaId": "27E31864-DE6C-48AF-A7B3-A66F63575ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xk:*:*:*:*:*:*",
"matchCriteriaId": "48572A1B-3696-4C47-9E59-30BC221FDEFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xl:*:*:*:*:*:*",
"matchCriteriaId": "C1AE04CB-E03D-4C29-A257-BFB9468F86CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xm:*:*:*:*:*:*",
"matchCriteriaId": "78F6FFF6-F5B9-4539-A189-6EA4C2D122CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xp:*:*:*:*:*:*",
"matchCriteriaId": "D8D5EFEF-F27A-429D-B005-BFC8D1D39FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xq:*:*:*:*:*:*",
"matchCriteriaId": "D8A3B7BF-D52A-487E-ADCA-C2537CB5F36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xr:*:*:*:*:*:*",
"matchCriteriaId": "35F77E17-F109-4CB7-8333-E0651FF2B5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xs:*:*:*:*:*:*",
"matchCriteriaId": "9AAD994B-C227-4D5A-B21A-51C44EEB4798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xt:*:*:*:*:*:*",
"matchCriteriaId": "FD3ABECA-25E5-4D10-B319-354F1C202C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xv:*:*:*:*:*:*",
"matchCriteriaId": "D50BD3AD-BCDC-4271-BFE1-D81DCE4106BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xw:*:*:*:*:*:*",
"matchCriteriaId": "91A12162-E442-4FA4-9CCA-67F910582D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xx:*:*:*:*:*:*",
"matchCriteriaId": "92EF445D-F19B-44F6-A878-6409D4E28FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xy:*:*:*:*:*:*",
"matchCriteriaId": "A0FD7E21-2C42-49B8-98A1-CB2E6DC6B3CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xz:*:*:*:*:*:*",
"matchCriteriaId": "05E1A96A-D29D-4D57-B40A-EB12A40116A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ya:*:*:*:*:*:*",
"matchCriteriaId": "59EE8734-9650-4B38-B62B-6A0ADF6E7BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yb:*:*:*:*:*:*",
"matchCriteriaId": "65351CCD-C47C-4035-88FB-616E05398C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yc:*:*:*:*:*:*",
"matchCriteriaId": "A28DF3F1-6788-4F7D-87CC-DEEA8D8F3205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yd:*:*:*:*:*:*",
"matchCriteriaId": "FA52C637-B9B1-4B3F-924F-A7D5286F816C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ye:*:*:*:*:*:*",
"matchCriteriaId": "81CF042A-391D-496B-8317-65CA10FEED03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yf:*:*:*:*:*:*",
"matchCriteriaId": "5C010477-1440-4B0F-937B-399D3A4535A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yh:*:*:*:*:*:*",
"matchCriteriaId": "675A9670-F046-4840-9B0B-E384046C4324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yi:*:*:*:*:*:*",
"matchCriteriaId": "C67EBC40-4D6E-4126-B044-BC1F215E868C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yj:*:*:*:*:*:*",
"matchCriteriaId": "FD317149-C33D-4139-AAA1-878005806645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:b:*:*:*:*:*:*",
"matchCriteriaId": "91844D86-1C49-4FBE-8D8E-84A75586B1A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bc:*:*:*:*:*:*",
"matchCriteriaId": "A31E1599-C1D0-40C6-B18A-D0604BD109F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bw:*:*:*:*:*:*",
"matchCriteriaId": "64B4036B-5BDF-4D1C-A0B2-7252F24742E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:by:*:*:*:*:*:*",
"matchCriteriaId": "C6CB71F1-6092-48C7-B715-7349F044360C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bz:*:*:*:*:*:*",
"matchCriteriaId": "D86ED994-3F96-4380-A2BE-71FDD3CAE4A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cx:*:*:*:*:*:*",
"matchCriteriaId": "74BFFADB-27F2-4C35-B5FC-9BAE1227EB51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cy:*:*:*:*:*:*",
"matchCriteriaId": "EA13518D-B17B-4531-B0E5-866120506116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:da:*:*:*:*:*:*",
"matchCriteriaId": "4BE495A4-E66B-4710-A554-D0FE9023E69D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dd:*:*:*:*:*:*",
"matchCriteriaId": "B13A02F5-65F2-4DB5-8EB3-8A0B9F7884D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dx:*:*:*:*:*:*",
"matchCriteriaId": "95224EB1-BD20-4AA4-AD35-7ADDD3049359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:eu:*:*:*:*:*:*",
"matchCriteriaId": "1AFEA3F7-D9AD-4817-9F75-864221C88DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ew:*:*:*:*:*:*",
"matchCriteriaId": "3013C05E-3A15-4FD8-943A-AAB36EB4FB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
"matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ex:*:*:*:*:*:*",
"matchCriteriaId": "0CE16131-2E4C-49F5-91A0-820AACC6683C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ey:*:*:*:*:*:*",
"matchCriteriaId": "D7BAF29F-1EB4-44F9-92C1-D3322D7C0B81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ez:*:*:*:*:*:*",
"matchCriteriaId": "DAB50CF9-9392-425C-B56E-3576CF0F6989",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:fz:*:*:*:*:*:*",
"matchCriteriaId": "EA697982-AF54-432F-8CCA-481678DE56D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixa:*:*:*:*:*:*",
"matchCriteriaId": "4DA9B310-0E8E-4BCD-8254-5B8835413D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixb:*:*:*:*:*:*",
"matchCriteriaId": "1D3B1EB1-E066-42D3-A623-8FBBF42220F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixc:*:*:*:*:*:*",
"matchCriteriaId": "D9631E85-B8BC-4F0A-AD9B-0DB668C1ED98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixd:*:*:*:*:*:*",
"matchCriteriaId": "25EA7E2F-8C5C-486A-B03D-D0A2A6BB5B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ja:*:*:*:*:*:*",
"matchCriteriaId": "9215D716-E6F6-4AEE-8808-9398A4826F04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mb:*:*:*:*:*:*",
"matchCriteriaId": "7B70078D-2F0E-4B00-8AF9-E2641A37A59E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mc:*:*:*:*:*:*",
"matchCriteriaId": "06F481C2-4714-4995-9ED6-766BF5EA5738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:s:*:*:*:*:*:*",
"matchCriteriaId": "BFE5AEBE-EB53-43F0-857E-7B4EDC1A0ED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
"matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sbc:*:*:*:*:*:*",
"matchCriteriaId": "1D64DA55-828B-40B4-9320-423121B5F8CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:se:*:*:*:*:*:*",
"matchCriteriaId": "04D4ED20-A74A-4553-8FAC-3DA57A6E7423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sea:*:*:*:*:*:*",
"matchCriteriaId": "AFD7C0D7-FE22-4EAA-A21E-D393DD73C5C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seb:*:*:*:*:*:*",
"matchCriteriaId": "2270E882-0B30-4948-B4E7-BA3E87DD7E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sec:*:*:*:*:*:*",
"matchCriteriaId": "D1A0DD83-80AB-4B1C-A267-2CCC2D37D57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sed:*:*:*:*:*:*",
"matchCriteriaId": "ED52280F-D956-4617-9AFC-2928CF8F93F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:see:*:*:*:*:*:*",
"matchCriteriaId": "A2C0605F-4FC6-43AC-A349-F1BB0572304F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sef:*:*:*:*:*:*",
"matchCriteriaId": "224BD2C9-6213-416F-88D2-5FAECC005802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seg:*:*:*:*:*:*",
"matchCriteriaId": "5CB5F125-9124-4C37-8FC9-CC63CFE20AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
"matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
"matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sm:*:*:*:*:*:*",
"matchCriteriaId": "5C0F2D29-F6E6-440E-B08C-8EED785878CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:so:*:*:*:*:*:*",
"matchCriteriaId": "C04488E3-F13F-4CA5-B8AF-6951FB510086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
"matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
"matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:st:*:*:*:*:*:*",
"matchCriteriaId": "80FB05B8-8BE5-4AE9-B018-DAB58034DC7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:su:*:*:*:*:*:*",
"matchCriteriaId": "69DC7D98-2B14-425F-8F93-A8BEBD9D1AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sv:*:*:*:*:*:*",
"matchCriteriaId": "90D0875E-837B-4F8A-92F8-1D2DD219570B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sw:*:*:*:*:*:*",
"matchCriteriaId": "CF6A17FF-49C2-489A-AD7B-FD1B014A3EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxa:*:*:*:*:*:*",
"matchCriteriaId": "C3E2ACD9-8623-4B0E-807A-CFC2900497E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
"matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
"matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sy:*:*:*:*:*:*",
"matchCriteriaId": "764FEE81-E2BD-4E46-92D8-48FEC6A1B249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sz:*:*:*:*:*:*",
"matchCriteriaId": "59E8E365-8A31-48EE-BE20-7FBE7E9B54B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:t:*:*:*:*:*:*",
"matchCriteriaId": "9C3E10F8-62D6-4159-B883-C886FD0B63DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:tpc:*:*:*:*:*:*",
"matchCriteriaId": "FABE7C54-B03B-4D1E-BF40-C0F357567543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:uz:*:*:*:*:*:*",
"matchCriteriaId": "9E4E6DF2-61BB-46AE-9B69-CCC899C9A38D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xa:*:*:*:*:*:*",
"matchCriteriaId": "B260F027-B463-490A-A067-D8324FE4871A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xb:*:*:*:*:*:*",
"matchCriteriaId": "C4644F2D-A4F4-42D3-931B-EB3B0AC15D72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xc:*:*:*:*:*:*",
"matchCriteriaId": "FB43EBD8-3517-4399-B532-5B84BE96B2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xd:*:*:*:*:*:*",
"matchCriteriaId": "F4C59703-BB87-459F-BA79-D22541CB73A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xe:*:*:*:*:*:*",
"matchCriteriaId": "71F5830A-D8FA-4A21-B7CB-E8A1E6746E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xf:*:*:*:*:*:*",
"matchCriteriaId": "114E0B28-5AD8-4FEC-A089-79017AAB33C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xg:*:*:*:*:*:*",
"matchCriteriaId": "6C4B4250-6044-43CF-84B1-53C4AE4ECC8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xh:*:*:*:*:*:*",
"matchCriteriaId": "E1C04A14-709B-44B3-B189-F50A41AA4C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xi:*:*:*:*:*:*",
"matchCriteriaId": "2C0EA3E0-6BFC-4A4A-ACFF-C38C3948B7E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xj:*:*:*:*:*:*",
"matchCriteriaId": "1C911936-17C0-43BE-A956-3F60D9606DAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xk:*:*:*:*:*:*",
"matchCriteriaId": "E1C06F44-E4A4-400B-AF91-7A4209733569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xl:*:*:*:*:*:*",
"matchCriteriaId": "E5B2FACC-2958-4E2D-BADD-51550F1FA63A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xm:*:*:*:*:*:*",
"matchCriteriaId": "582B03D7-57A4-4E00-9B67-4DC2B4320DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xn:*:*:*:*:*:*",
"matchCriteriaId": "8038D0FA-30FB-4BC1-A33D-6BE76C248D21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xq:*:*:*:*:*:*",
"matchCriteriaId": "F5B5177C-98A7-42FF-83A8-8DFE33B28595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xr:*:*:*:*:*:*",
"matchCriteriaId": "19C09D13-4124-461C-9976-F7B141563532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xs:*:*:*:*:*:*",
"matchCriteriaId": "EE8EBF0C-7C7B-4C12-8135-0AB9957B7E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xt:*:*:*:*:*:*",
"matchCriteriaId": "09C89AB4-7060-401D-B8B1-A5969D843558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xu:*:*:*:*:*:*",
"matchCriteriaId": "A365C1C0-B014-42C9-A8B3-9D0C967DC9E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xv:*:*:*:*:*:*",
"matchCriteriaId": "0A56B6C5-C50D-44CF-BF43-4EDEBDA19581",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xw:*:*:*:*:*:*",
"matchCriteriaId": "D5AE6379-25CE-44A1-BA61-2461DB0C0E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ya:*:*:*:*:*:*",
"matchCriteriaId": "907A6B20-721D-4756-840F-8A2EE776BDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yb:*:*:*:*:*:*",
"matchCriteriaId": "DBD1A8F1-73AD-41A0-8426-158402875952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yc:*:*:*:*:*:*",
"matchCriteriaId": "0D431519-F500-408D-A79D-DAE2DF2F3A5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ye:*:*:*:*:*:*",
"matchCriteriaId": "880952B0-E796-4C8A-9D28-900338B3C629",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yj:*:*:*:*:*:*",
"matchCriteriaId": "B5D19A29-3500-4D69-B55F-16F6AF04CF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yk:*:*:*:*:*:*",
"matchCriteriaId": "ECD7F135-CFC7-42D4-A223-02D69B905E4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yl:*:*:*:*:*:*",
"matchCriteriaId": "AE54DF91-7757-4676-A497-2FDE4B039367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ym:*:*:*:*:*:*",
"matchCriteriaId": "65F91BB4-5721-46B8-97D7-98467F7E1172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yn:*:*:*:*:*:*",
"matchCriteriaId": "582D94B0-5980-492A-A8BB-4C107521573C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yo:*:*:*:*:*:*",
"matchCriteriaId": "A6DCA5A2-7CE2-4273-B548-AA63E8EBCA2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yp:*:*:*:*:*:*",
"matchCriteriaId": "5A3625CC-B081-41DF-9C18-921C67FB4D95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yq:*:*:*:*:*:*",
"matchCriteriaId": "59DBDE9C-1898-4D8C-B63F-0F962FDEA23C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yr:*:*:*:*:*:*",
"matchCriteriaId": "C072D406-81E6-4FA8-82AC-47033F3229D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ys:*:*:*:*:*:*",
"matchCriteriaId": "06193800-DE6B-4014-99A2-AE9AAFC11F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yt:*:*:*:*:*:*",
"matchCriteriaId": "A7ED5BF0-BC3A-467A-BF14-8FE3529FD6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yu:*:*:*:*:*:*",
"matchCriteriaId": "AC94BEC7-F050-4679-9331-9B7F679B2196",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yv:*:*:*:*:*:*",
"matchCriteriaId": "9D21DF3F-4793-4F4A-94E7-C174EEC7CF61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yx:*:*:*:*:*:*",
"matchCriteriaId": "FD47D76A-7F35-4B38-B479-FDA1EB09C35D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yy:*:*:*:*:*:*",
"matchCriteriaId": "A82F0863-9143-4390-A9C0-19DDB06C176E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:za:*:*:*:*:*:*",
"matchCriteriaId": "D86A8DA9-D114-4BBE-90DE-F643C12EFB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zb:*:*:*:*:*:*",
"matchCriteriaId": "DF7E107F-4805-4832-A013-A35D374FF07C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zc:*:*:*:*:*:*",
"matchCriteriaId": "2223DB0D-E7DA-488A-96C2-8845946CEDA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zd:*:*:*:*:*:*",
"matchCriteriaId": "5779F924-F313-427F-82F4-571E657B57F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ze:*:*:*:*:*:*",
"matchCriteriaId": "9783B2B3-F735-4E96-8FAA-679D753CDC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zf:*:*:*:*:*:*",
"matchCriteriaId": "748B610B-7659-431E-BCB9-B7B5E72C0E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zg:*:*:*:*:*:*",
"matchCriteriaId": "98798701-533E-4255-9450-C6354B779EF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zh:*:*:*:*:*:*",
"matchCriteriaId": "F69E5442-C31F-46C8-8911-F5B77437754A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zj:*:*:*:*:*:*",
"matchCriteriaId": "E1D75842-3328-49A3-AC0E-C508CACE5C71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
"matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zp:*:*:*:*:*:*",
"matchCriteriaId": "FA06B835-2324-47D4-A04D-D01FFA069A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
"matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
"matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xl:*:*:*:*:*:*",
"matchCriteriaId": "57C8EB63-52B5-4B16-8EA1-621790F70B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xm:*:*:*:*:*:*",
"matchCriteriaId": "61C80F8B-ADE8-4289-8D87-02C6284D5A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xn:*:*:*:*:*:*",
"matchCriteriaId": "3CBBBBD1-496B-4C31-80B8-C217E915F077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xt:*:*:*:*:*:*",
"matchCriteriaId": "07ED91C2-B8ED-4AE7-8A37-82DB94EE28A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xv:*:*:*:*:*:*",
"matchCriteriaId": "CBDA82BB-93D1-436C-9598-0AF3FAC8CD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
"matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xy:*:*:*:*:*:*",
"matchCriteriaId": "8049D059-2A09-4820-A4F0-6B8D794606BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
},
{
"lang": "es",
"value": "El componente data-link switching (DLSw) en Cisco IOS 12.0 hasta 12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo o consumo de memoria) a trav\u00e9s de 91 paquetes manipulados del (1) puerto UDP 2067 o (2) protocolo IP."
}
],
"id": "CVE-2008-1152",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-27T17:44:00.000",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/28465"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1019712"
},
{
"source": "psirt@cisco.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "psirt@cisco.com",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28465"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019712"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1153
Vulnerability from fkie_nvd - Published: 2008-03-27 10:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
},
{
"lang": "es",
"value": "Cisco IOS versiones 12.1, 12.2, 12.3 y 12.4, con servicios UDP de IPv4 y el protocolo IPv6 habilitado, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del dispositivo y posible interfaz bloqueada) por medio de un paquete IPv6 dise\u00f1ado para el dispositivo."
}
],
"id": "CVE-2008-1153",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-27T10:44:00.000",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "psirt@cisco.com",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/28461"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1019713"
},
{
"source": "psirt@cisco.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "psirt@cisco.com",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1156
Vulnerability from fkie_nvd - Published: 2008-03-27 10:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en la implementaci\u00f3n de la Red Privada Virtual Multicast (MVPN) en Cisco IOS 12.0, 12.2, 12.3, y 12.4 permite a atacantes remotos crear \"estados multicast extra en los routers core\" a trav\u00e9s de mensajes Multicast Distribution Tree (MDT) Data Join manipulados."
}
],
"id": "CVE-2008-1156",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-03-27T10:44:00.000",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/28464"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1019715"
},
{
"source": "psirt@cisco.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "psirt@cisco.com",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"source": "psirt@cisco.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
},
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2015-4204 (GCVE-0-2015-4204)
Vulnerability from cvelistv5 – Published: 2015-06-23 10:00 – Updated: 2024-08-06 06:04
VLAI?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:04:03.096Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1032692",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/75337"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-06-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-23T18:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1032692",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/75337"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4204",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1032692",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75337"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2015-4204",
"datePublished": "2015-06-23T10:00:00",
"dateReserved": "2015-06-04T00:00:00",
"dateUpdated": "2024-08-06T06:04:03.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0634 (GCVE-0-2009-0634)
Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.357Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:12043",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "oval:org.mitre.oval:def:12043",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0634",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:12043",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0634",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0633 (GCVE-0-2009-0633)
Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.037Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0633",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0628 (GCVE-0-2009-0628)
Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.091Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0628",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0628",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.091Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1152 (GCVE-0-2008-1152)
Vulnerability from cvelistv5 – Published: 2008-03-27 17:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.828Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1152",
"datePublished": "2008-03-27T17:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.828Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1153 (GCVE-0-2008-1153)
Vulnerability from cvelistv5 – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.603Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1153",
"datePublished": "2008-03-27T10:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.603Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1156 (GCVE-0-2008-1156)
Vulnerability from cvelistv5 – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1156",
"datePublished": "2008-03-27T10:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-4204 (GCVE-0-2015-4204)
Vulnerability from nvd – Published: 2015-06-23 10:00 – Updated: 2024-08-06 06:04
VLAI?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:04:03.096Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1032692",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/75337"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-06-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-23T18:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1032692",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/75337"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4204",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1032692",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032692"
},
{
"name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440"
},
{
"name": "75337",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75337"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2015-4204",
"datePublished": "2015-06-23T10:00:00",
"dateReserved": "2015-06-04T00:00:00",
"dateUpdated": "2024-08-06T06:04:03.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0634 (GCVE-0-2009-0634)
Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.357Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:12043",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "oval:org.mitre.oval:def:12043",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0634",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:12043",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
},
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "34241",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-ha-dos(49585)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
},
{
"name": "ios-mobile-dos(49424)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0634",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0633 (GCVE-0-2009-0633)
Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.037Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "oval:org.mitre.oval:def:12290",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290"
},
{
"name": "34241",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34241"
},
{
"name": "1021898",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021898"
},
{
"name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
},
{
"name": "ios-mobile-dos(49424)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0633",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0628 (GCVE-0-2009-0628)
Vulnerability from nvd – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.091Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0628",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "oval:org.mitre.oval:def:12092",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
},
{
"name": "34239",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "ios-sslvpn-tcbleak-dos(49427)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0628",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.091Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1152 (GCVE-0-2008-1152)
Vulnerability from nvd – Published: 2008-03-27 17:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.828Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019712",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019712"
},
{
"name": "28465",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28465"
},
{
"name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
},
{
"name": "oval:org.mitre.oval:def:5821",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821"
},
{
"name": "cisco-ios-dlsw-dos(41482)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1152",
"datePublished": "2008-03-27T17:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.828Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1153 (GCVE-0-2008-1153)
Vulnerability from nvd – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.603Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1153",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "oval:org.mitre.oval:def:5860",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860"
},
{
"name": "cisco-ios-ipv6-dualstack-dos(41475)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475"
},
{
"name": "28461",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28461"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "1019713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019713"
},
{
"name": "VU#936177",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/936177"
},
{
"name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1153",
"datePublished": "2008-03-27T10:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.603Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1156 (GCVE-0-2008-1156)
Vulnerability from nvd – Published: 2008-03-27 10:00 – Updated: 2024-08-07 08:08
VLAI?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:08:57.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "ADV-2008-1006",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-1156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1006",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1006/references"
},
{
"name": "cisco-ios-mvpm-information-disclosure(41468)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468"
},
{
"name": "TA08-087B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html"
},
{
"name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml"
},
{
"name": "28464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28464"
},
{
"name": "29507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29507"
},
{
"name": "1019715",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019715"
},
{
"name": "oval:org.mitre.oval:def:5648",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-1156",
"datePublished": "2008-03-27T10:00:00",
"dateReserved": "2008-03-05T00:00:00",
"dateUpdated": "2024-08-07T08:08:57.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}