All the vulnerabilites related to cisco - cisco_ios
cve-2009-0634
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043 | vdb-entry, signature, x_refsource_OVAL | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml | x_refsource_CONFIRM | |
http://secunia.com/advisories/34438 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/34241 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1021898 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49585 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49424 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2009/0851 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:12043", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "oval:org.mitre.oval:def:12043", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-0634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:12043", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0851" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-0634", "datePublished": "2009-03-27T16:00:00", "dateReserved": "2009-02-18T00:00:00", "dateUpdated": "2024-08-07T04:40:05.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0628
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/34239 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/34438 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1021896 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49427 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.vupen.com/english/advisories/2009/0851 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "oval:org.mitre.oval:def:12092", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" }, { "name": "34239", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34239" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34438" }, { "name": "1021896", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021896" }, { "name": "ios-sslvpn-tcbleak-dos(49427)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" }, { "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "oval:org.mitre.oval:def:12092", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" }, { "name": "34239", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34239" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34438" }, { "name": "1021896", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021896" }, { "name": "ios-sslvpn-tcbleak-dos(49427)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" }, { "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-0628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "oval:org.mitre.oval:def:12092", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" }, { "name": "34239", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34239" }, { "name": "34438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34438" }, { "name": "1021896", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021896" }, { "name": "ios-sslvpn-tcbleak-dos(49427)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" }, { "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" }, { "name": "ADV-2009-0851", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0851" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-0628", "datePublished": "2009-03-27T16:00:00", "dateReserved": "2009-02-18T00:00:00", "dateUpdated": "2024-08-07T04:40:05.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1152
Vulnerability from cvelistv5
Published
2008-03-27 17:00
Modified
2024-08-07 08:08
Severity ?
EPSS score ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1006/references | vdb-entry, x_refsource_VUPEN | |
http://www.us-cert.gov/cas/techalerts/TA08-087B.html | third-party-advisory, x_refsource_CERT | |
http://www.securitytracker.com/id?1019712 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/28465 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/29507 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821 | vdb-entry, signature, x_refsource_OVAL | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41482 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019712", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019712" }, { "name": "28465", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28465" }, { "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29507" }, { "name": "oval:org.mitre.oval:def:5821", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821" }, { "name": "cisco-ios-dlsw-dos(41482)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019712", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019712" }, { "name": "28465", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28465" }, { "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29507" }, { "name": "oval:org.mitre.oval:def:5821", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821" }, { "name": "cisco-ios-dlsw-dos(41482)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2008-1152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1006", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "TA08-087B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019712", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019712" }, { "name": "28465", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28465" }, { "name": "20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" }, { "name": "29507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29507" }, { "name": "oval:org.mitre.oval:def:5821", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821" }, { "name": "cisco-ios-dlsw-dos(41482)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2008-1152", "datePublished": "2008-03-27T17:00:00", "dateReserved": "2008-03-05T00:00:00", "dateUpdated": "2024-08-07T08:08:57.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1153
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:08
Severity ?
EPSS score ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1006/references | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860 | vdb-entry, signature, x_refsource_OVAL | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41475 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/28461 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA08-087B.html | third-party-advisory, x_refsource_CERT | |
http://www.securitytracker.com/id?1019713 | vdb-entry, x_refsource_SECTRACK | |
http://www.kb.cert.org/vuls/id/936177 | third-party-advisory, x_refsource_CERT-VN | |
http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml | vendor-advisory, x_refsource_CISCO | |
http://secunia.com/advisories/29507 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "oval:org.mitre.oval:def:5860", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860" }, { "name": "cisco-ios-ipv6-dualstack-dos(41475)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475" }, { "name": "28461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28461" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019713", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019713" }, { "name": "VU#936177", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/936177" }, { "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29507" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "oval:org.mitre.oval:def:5860", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860" }, { "name": "cisco-ios-ipv6-dualstack-dos(41475)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475" }, { "name": "28461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28461" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019713", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019713" }, { "name": "VU#936177", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/936177" }, { "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29507" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2008-1153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1006", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "oval:org.mitre.oval:def:5860", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860" }, { "name": "cisco-ios-ipv6-dualstack-dos(41475)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475" }, { "name": "28461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28461" }, { "name": "TA08-087B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "1019713", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019713" }, { "name": "VU#936177", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/936177" }, { "name": "20080326 Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" }, { "name": "29507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29507" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2008-1153", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-05T00:00:00", "dateUpdated": "2024-08-07T08:08:57.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1156
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:08
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/1006/references | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41468 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/cas/techalerts/TA08-087B.html | third-party-advisory, x_refsource_CERT | |
http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/28464 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/29507 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1019715 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "cisco-ios-mvpm-information-disclosure(41468)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" }, { "name": "28464", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28464" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29507" }, { "name": "1019715", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019715" }, { "name": "oval:org.mitre.oval:def:5648", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "ADV-2008-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "cisco-ios-mvpm-information-disclosure(41468)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468" }, { "name": "TA08-087B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" }, { "name": "28464", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28464" }, { "name": "29507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29507" }, { "name": "1019715", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019715" }, { "name": "oval:org.mitre.oval:def:5648", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2008-1156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1006", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "name": "cisco-ios-mvpm-information-disclosure(41468)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468" }, { "name": "TA08-087B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "name": "20080326 Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" }, { "name": "28464", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28464" }, { "name": "29507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29507" }, { "name": "1019715", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019715" }, { "name": "oval:org.mitre.oval:def:5648", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2008-1156", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-05T00:00:00", "dateUpdated": "2024-08-07T08:08:57.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-4204
Vulnerability from cvelistv5
Published
2015-06-23 10:00
Modified
2024-08-06 06:04
Severity ?
EPSS score ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032692 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=39440 | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/75337 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:04:03.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032692", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032692" }, { "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440" }, { "name": "75337", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75337" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1032692", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032692" }, { "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440" }, { "name": "75337", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75337" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-4204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032692", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032692" }, { "name": "20150622 Cisco IOS Software UBR Devices SNMP Subsystem Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440" }, { "name": "75337", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75337" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-4204", "datePublished": "2015-06-23T10:00:00", "dateReserved": "2015-06-04T00:00:00", "dateUpdated": "2024-08-06T06:04:03.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0633
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml | x_refsource_CONFIRM | |
http://secunia.com/advisories/34438 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/34241 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1021898 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49424 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2009/0851 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34438" }, { "name": "oval:org.mitre.oval:def:12290", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34438" }, { "name": "oval:org.mitre.oval:def:12290", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-0633", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34438" }, { "name": "oval:org.mitre.oval:def:12290", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" }, { "name": "34241", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-dos(49424)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0851" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-0633", "datePublished": "2009-03-27T16:00:00", "dateReserved": "2009-02-18T00:00:00", "dateUpdated": "2024-08-07T04:40:05.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0960
Vulnerability from cvelistv5
Published
2008-06-10 18:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30574" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30574" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30615" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30648" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30574" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-0960", "datePublished": "2008-06-10T18:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-03-27 17:44
Modified
2024-11-21 00:43
Severity ?
Summary
The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:da:*:*:*:*:*:*", "matchCriteriaId": "225C93BF-8749-46AB-BAE7-9A67C7B99552", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:db:*:*:*:*:*:*", "matchCriteriaId": "AD6138B2-1F13-4D98-B389-496E1F50FCFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:dc:*:*:*:*:*:*", "matchCriteriaId": "33D056B2-CB1C-4287-A3E0-E0F985304969", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sc:*:*:*:*:*:*", "matchCriteriaId": "EB1A7A2E-265F-4322-A6ED-4DD761497D4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sl:*:*:*:*:*:*", "matchCriteriaId": "D2E8E311-8E6C-42FC-A662-799CC78E22FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sp:*:*:*:*:*:*", "matchCriteriaId": "2B02125C-1132-4748-9495-60BACFA2164D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:st:*:*:*:*:*:*", "matchCriteriaId": "0FE78CB4-3CF1-4F0A-B4CA-6B6E33D1991D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sx:*:*:*:*:*:*", "matchCriteriaId": "B6680190-2688-48E2-BE31-A186A82AF79F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sz:*:*:*:*:*:*", "matchCriteriaId": "BB4F46A5-7561-4C17-BB15-F9A704DB1E66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:t:*:*:*:*:*:*", "matchCriteriaId": "ACC2FCAE-6A56-4D45-A35F-CA2C2C7A4372", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wc:*:*:*:*:*:*", "matchCriteriaId": "8D10302E-76CE-4D65-9068-2657C1834215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:wt:*:*:*:*:*:*", "matchCriteriaId": "48BABA92-17D7-419D-B25D-2DE914F12D91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xa:*:*:*:*:*:*", "matchCriteriaId": "607E42A0-D5BA-4B59-812F-44DC970202D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xb:*:*:*:*:*:*", "matchCriteriaId": "AA54B6EB-CA03-4209-ACA6-7AE6455B764A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xc:*:*:*:*:*:*", "matchCriteriaId": "DC811D5E-A2D1-4098-990F-06DEC9080276", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xd:*:*:*:*:*:*", "matchCriteriaId": "9C1A32C0-0809-4242-9D23-7F8887D8AFE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xe:*:*:*:*:*:*", "matchCriteriaId": "9048DB68-228A-4496-9FEC-514A65130DA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xf:*:*:*:*:*:*", "matchCriteriaId": "6D2435B9-EFE4-4CA6-9E55-C9C050D579DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xg:*:*:*:*:*:*", "matchCriteriaId": "2929498A-BB56-48B2-9089-E6B602B81929", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xh:*:*:*:*:*:*", "matchCriteriaId": "73BA6E1B-B6DC-404A-BF1D-5059EB2F7C16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xi:*:*:*:*:*:*", "matchCriteriaId": "B385E45E-FCBD-4574-88FD-E000F320BE6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xj:*:*:*:*:*:*", "matchCriteriaId": "2FC95E36-024E-487B-8190-E96745B590EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xk:*:*:*:*:*:*", "matchCriteriaId": "6A006524-45C0-4B11-82A3-0AF69374BD29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xl:*:*:*:*:*:*", "matchCriteriaId": "518AAECA-0455-4688-8937-2D4248962C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xm:*:*:*:*:*:*", "matchCriteriaId": "6EE54B6B-99F0-40B2-990C-950E08E05FBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xn:*:*:*:*:*:*", "matchCriteriaId": "F740871A-7E8C-4077-8DB0-9D54B18D4037", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xo:*:*:*:*:*:*", "matchCriteriaId": "7D0B5D1A-016B-4017-B476-F66F6A82ABCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xq:*:*:*:*:*:*", "matchCriteriaId": "A7897C03-2EE4-42D5-9A70-9FD9DD025708", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xr:*:*:*:*:*:*", "matchCriteriaId": "BA0D5F4E-21CC-464C-930A-4DB1C25DDA70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xs:*:*:*:*:*:*", "matchCriteriaId": "54348563-5740-4EF0-AADA-B864F3A47277", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xv:*:*:*:*:*:*", "matchCriteriaId": "A091E988-DA6B-4FC9-9899-86F97AA29C18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:xw:*:*:*:*:*:*", "matchCriteriaId": "39C863BC-B042-41C7-A15D-4D29CA8933CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:aa:*:*:*:*:*:*", "matchCriteriaId": "0AE43587-46FE-4930-84FB-689AFCC122E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ax:*:*:*:*:*:*", "matchCriteriaId": "A0D676A9-7110-4446-9503-73BA2A4F49BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:az:*:*:*:*:*:*", "matchCriteriaId": "437F70FE-58DD-4F92-8219-4B09AAFA6F85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:b:*:*:*:*:*:*", "matchCriteriaId": "EC1D82C4-AA1B-492C-81A7-7D579687C684", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:c:*:*:*:*:*:*", "matchCriteriaId": "02045A97-7AF6-4308-95A1-F4AC47A75AAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:cx:*:*:*:*:*:*", "matchCriteriaId": "0B560BA9-D8EF-4618-A909-1B779829E4DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:d:*:*:*:*:*:*", "matchCriteriaId": "5CB10E53-3177-4502-88DA-CA935403DADA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:da:*:*:*:*:*:*", "matchCriteriaId": "A61E033B-EFDD-4ECC-A370-F85A8D8161D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:db:*:*:*:*:*:*", "matchCriteriaId": "90F4AB09-46FE-47F7-831D-863F5C296A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:dc:*:*:*:*:*:*", "matchCriteriaId": "22723E8E-18E9-45A4-A216-D7D2B4EC8A93", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ea:*:*:*:*:*:*", "matchCriteriaId": "4B2F42F9-1760-4A97-ADAE-66E5FC0B81FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eb:*:*:*:*:*:*", "matchCriteriaId": "E92ACC7B-EB0E-4142-8397-3AF58C3E7406", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ec:*:*:*:*:*:*", "matchCriteriaId": "EAC665EA-CFAF-4F69-B8F6-BBC7D869CA42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eo:*:*:*:*:*:*", "matchCriteriaId": "365D4890-2676-4C0D-9D64-95A07B10DA8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:eu:*:*:*:*:*:*", "matchCriteriaId": "1B1705DD-7DA2-4203-96FD-2344BBF99A17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ew:*:*:*:*:*:*", "matchCriteriaId": "660ED401-2B7F-477F-99BA-DC553D47A9D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ex:*:*:*:*:*:*", "matchCriteriaId": "D5F66FC9-7BBB-460A-9D50-E971F8F489AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ey:*:*:*:*:*:*", "matchCriteriaId": "83A2B33B-BD96-42D6-B455-C6877F8C5BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ez:*:*:*:*:*:*", "matchCriteriaId": "946C08B8-DB52-41F0-8963-FD865FDE4462", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ga:*:*:*:*:*:*", "matchCriteriaId": "F4F4AC3A-F2B8-40FB-A11D-9B2F8F81F699", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:gb:*:*:*:*:*:*", "matchCriteriaId": "5A7CEA79-0B95-4EA4-B07C-AE93A75BF7A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xa:*:*:*:*:*:*", "matchCriteriaId": "F6A42922-F82A-4F7E-AF58-CAC0FD3402BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xb:*:*:*:*:*:*", "matchCriteriaId": "11BD3E2A-45B6-4A50-81C0-5089138434C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xc:*:*:*:*:*:*", "matchCriteriaId": "C62A96DA-2A55-4B7B-9D66-19583B4FD63A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xd:*:*:*:*:*:*", "matchCriteriaId": "DCE34BEA-83F6-4908-A71B-7850D2B964ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xe:*:*:*:*:*:*", "matchCriteriaId": "07B63B0A-1D38-4E5A-8D6E-5DE8F961E0F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xf:*:*:*:*:*:*", "matchCriteriaId": "3E856620-FF4D-48B6-BAD6-F85744185593", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xg:*:*:*:*:*:*", "matchCriteriaId": "6D78F36C-02EF-4839-B361-999F0445F20B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xh:*:*:*:*:*:*", "matchCriteriaId": "9EEB9ED5-A623-46F0-8386-35DA38BD5FA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xi:*:*:*:*:*:*", "matchCriteriaId": "E2F6E880-FDB3-4888-95FC-8709444530E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xj:*:*:*:*:*:*", "matchCriteriaId": "27E31864-DE6C-48AF-A7B3-A66F63575ABF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xk:*:*:*:*:*:*", "matchCriteriaId": "48572A1B-3696-4C47-9E59-30BC221FDEFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xl:*:*:*:*:*:*", "matchCriteriaId": "C1AE04CB-E03D-4C29-A257-BFB9468F86CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xm:*:*:*:*:*:*", "matchCriteriaId": "78F6FFF6-F5B9-4539-A189-6EA4C2D122CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xp:*:*:*:*:*:*", "matchCriteriaId": "D8D5EFEF-F27A-429D-B005-BFC8D1D39FA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xq:*:*:*:*:*:*", "matchCriteriaId": "D8A3B7BF-D52A-487E-ADCA-C2537CB5F36C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xr:*:*:*:*:*:*", "matchCriteriaId": "35F77E17-F109-4CB7-8333-E0651FF2B5DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xs:*:*:*:*:*:*", "matchCriteriaId": "9AAD994B-C227-4D5A-B21A-51C44EEB4798", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xt:*:*:*:*:*:*", "matchCriteriaId": "FD3ABECA-25E5-4D10-B319-354F1C202C14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xv:*:*:*:*:*:*", "matchCriteriaId": "D50BD3AD-BCDC-4271-BFE1-D81DCE4106BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xw:*:*:*:*:*:*", "matchCriteriaId": "91A12162-E442-4FA4-9CCA-67F910582D9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xx:*:*:*:*:*:*", "matchCriteriaId": "92EF445D-F19B-44F6-A878-6409D4E28FC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xy:*:*:*:*:*:*", "matchCriteriaId": "A0FD7E21-2C42-49B8-98A1-CB2E6DC6B3CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:xz:*:*:*:*:*:*", "matchCriteriaId": "05E1A96A-D29D-4D57-B40A-EB12A40116A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ya:*:*:*:*:*:*", "matchCriteriaId": "59EE8734-9650-4B38-B62B-6A0ADF6E7BD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yb:*:*:*:*:*:*", "matchCriteriaId": "65351CCD-C47C-4035-88FB-616E05398C1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yc:*:*:*:*:*:*", "matchCriteriaId": "A28DF3F1-6788-4F7D-87CC-DEEA8D8F3205", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yd:*:*:*:*:*:*", "matchCriteriaId": "FA52C637-B9B1-4B3F-924F-A7D5286F816C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:ye:*:*:*:*:*:*", "matchCriteriaId": "81CF042A-391D-496B-8317-65CA10FEED03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yf:*:*:*:*:*:*", "matchCriteriaId": "5C010477-1440-4B0F-937B-399D3A4535A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yh:*:*:*:*:*:*", "matchCriteriaId": "675A9670-F046-4840-9B0B-E384046C4324", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yi:*:*:*:*:*:*", "matchCriteriaId": "C67EBC40-4D6E-4126-B044-BC1F215E868C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:yj:*:*:*:*:*:*", "matchCriteriaId": "FD317149-C33D-4139-AAA1-878005806645", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:b:*:*:*:*:*:*", "matchCriteriaId": "91844D86-1C49-4FBE-8D8E-84A75586B1A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bc:*:*:*:*:*:*", "matchCriteriaId": "A31E1599-C1D0-40C6-B18A-D0604BD109F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bw:*:*:*:*:*:*", "matchCriteriaId": "64B4036B-5BDF-4D1C-A0B2-7252F24742E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:by:*:*:*:*:*:*", "matchCriteriaId": "C6CB71F1-6092-48C7-B715-7349F044360C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:bz:*:*:*:*:*:*", "matchCriteriaId": "D86ED994-3F96-4380-A2BE-71FDD3CAE4A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cx:*:*:*:*:*:*", "matchCriteriaId": "74BFFADB-27F2-4C35-B5FC-9BAE1227EB51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:cy:*:*:*:*:*:*", "matchCriteriaId": "EA13518D-B17B-4531-B0E5-866120506116", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:da:*:*:*:*:*:*", "matchCriteriaId": "4BE495A4-E66B-4710-A554-D0FE9023E69D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dd:*:*:*:*:*:*", "matchCriteriaId": "B13A02F5-65F2-4DB5-8EB3-8A0B9F7884D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:dx:*:*:*:*:*:*", "matchCriteriaId": "95224EB1-BD20-4AA4-AD35-7ADDD3049359", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:eu:*:*:*:*:*:*", "matchCriteriaId": "1AFEA3F7-D9AD-4817-9F75-864221C88DC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ew:*:*:*:*:*:*", "matchCriteriaId": "3013C05E-3A15-4FD8-943A-AAB36EB4FB41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ex:*:*:*:*:*:*", "matchCriteriaId": "0CE16131-2E4C-49F5-91A0-820AACC6683C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ey:*:*:*:*:*:*", "matchCriteriaId": "D7BAF29F-1EB4-44F9-92C1-D3322D7C0B81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ez:*:*:*:*:*:*", "matchCriteriaId": "DAB50CF9-9392-425C-B56E-3576CF0F6989", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:fz:*:*:*:*:*:*", "matchCriteriaId": "EA697982-AF54-432F-8CCA-481678DE56D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixa:*:*:*:*:*:*", "matchCriteriaId": "4DA9B310-0E8E-4BCD-8254-5B8835413D78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixb:*:*:*:*:*:*", "matchCriteriaId": "1D3B1EB1-E066-42D3-A623-8FBBF42220F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixc:*:*:*:*:*:*", "matchCriteriaId": "D9631E85-B8BC-4F0A-AD9B-0DB668C1ED98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ixd:*:*:*:*:*:*", "matchCriteriaId": "25EA7E2F-8C5C-486A-B03D-D0A2A6BB5B69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ja:*:*:*:*:*:*", "matchCriteriaId": "9215D716-E6F6-4AEE-8808-9398A4826F04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mb:*:*:*:*:*:*", "matchCriteriaId": "7B70078D-2F0E-4B00-8AF9-E2641A37A59E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:mc:*:*:*:*:*:*", "matchCriteriaId": "06F481C2-4714-4995-9ED6-766BF5EA5738", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:s:*:*:*:*:*:*", "matchCriteriaId": "BFE5AEBE-EB53-43F0-857E-7B4EDC1A0ED9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sbc:*:*:*:*:*:*", "matchCriteriaId": "1D64DA55-828B-40B4-9320-423121B5F8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:se:*:*:*:*:*:*", "matchCriteriaId": "04D4ED20-A74A-4553-8FAC-3DA57A6E7423", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sea:*:*:*:*:*:*", "matchCriteriaId": "AFD7C0D7-FE22-4EAA-A21E-D393DD73C5C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seb:*:*:*:*:*:*", "matchCriteriaId": "2270E882-0B30-4948-B4E7-BA3E87DD7E7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sec:*:*:*:*:*:*", "matchCriteriaId": "D1A0DD83-80AB-4B1C-A267-2CCC2D37D57E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sed:*:*:*:*:*:*", "matchCriteriaId": "ED52280F-D956-4617-9AFC-2928CF8F93F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:see:*:*:*:*:*:*", "matchCriteriaId": "A2C0605F-4FC6-43AC-A349-F1BB0572304F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sef:*:*:*:*:*:*", "matchCriteriaId": "224BD2C9-6213-416F-88D2-5FAECC005802", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:seg:*:*:*:*:*:*", "matchCriteriaId": "5CB5F125-9124-4C37-8FC9-CC63CFE20AE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sm:*:*:*:*:*:*", "matchCriteriaId": "5C0F2D29-F6E6-440E-B08C-8EED785878CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:so:*:*:*:*:*:*", "matchCriteriaId": "C04488E3-F13F-4CA5-B8AF-6951FB510086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:st:*:*:*:*:*:*", "matchCriteriaId": "80FB05B8-8BE5-4AE9-B018-DAB58034DC7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:su:*:*:*:*:*:*", "matchCriteriaId": "69DC7D98-2B14-425F-8F93-A8BEBD9D1AE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sv:*:*:*:*:*:*", "matchCriteriaId": "90D0875E-837B-4F8A-92F8-1D2DD219570B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sw:*:*:*:*:*:*", "matchCriteriaId": "CF6A17FF-49C2-489A-AD7B-FD1B014A3EB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxa:*:*:*:*:*:*", "matchCriteriaId": "C3E2ACD9-8623-4B0E-807A-CFC2900497E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sy:*:*:*:*:*:*", "matchCriteriaId": "764FEE81-E2BD-4E46-92D8-48FEC6A1B249", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sz:*:*:*:*:*:*", "matchCriteriaId": "59E8E365-8A31-48EE-BE20-7FBE7E9B54B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:t:*:*:*:*:*:*", "matchCriteriaId": "9C3E10F8-62D6-4159-B883-C886FD0B63DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:tpc:*:*:*:*:*:*", "matchCriteriaId": "FABE7C54-B03B-4D1E-BF40-C0F357567543", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:uz:*:*:*:*:*:*", "matchCriteriaId": "9E4E6DF2-61BB-46AE-9B69-CCC899C9A38D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xa:*:*:*:*:*:*", "matchCriteriaId": "B260F027-B463-490A-A067-D8324FE4871A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xb:*:*:*:*:*:*", "matchCriteriaId": "C4644F2D-A4F4-42D3-931B-EB3B0AC15D72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xc:*:*:*:*:*:*", "matchCriteriaId": "FB43EBD8-3517-4399-B532-5B84BE96B2A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xd:*:*:*:*:*:*", "matchCriteriaId": "F4C59703-BB87-459F-BA79-D22541CB73A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xe:*:*:*:*:*:*", "matchCriteriaId": "71F5830A-D8FA-4A21-B7CB-E8A1E6746E67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xf:*:*:*:*:*:*", "matchCriteriaId": "114E0B28-5AD8-4FEC-A089-79017AAB33C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xg:*:*:*:*:*:*", "matchCriteriaId": "6C4B4250-6044-43CF-84B1-53C4AE4ECC8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xh:*:*:*:*:*:*", "matchCriteriaId": "E1C04A14-709B-44B3-B189-F50A41AA4C86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xi:*:*:*:*:*:*", "matchCriteriaId": "2C0EA3E0-6BFC-4A4A-ACFF-C38C3948B7E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xj:*:*:*:*:*:*", "matchCriteriaId": "1C911936-17C0-43BE-A956-3F60D9606DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xk:*:*:*:*:*:*", "matchCriteriaId": "E1C06F44-E4A4-400B-AF91-7A4209733569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xl:*:*:*:*:*:*", "matchCriteriaId": "E5B2FACC-2958-4E2D-BADD-51550F1FA63A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xm:*:*:*:*:*:*", "matchCriteriaId": "582B03D7-57A4-4E00-9B67-4DC2B4320DFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xn:*:*:*:*:*:*", "matchCriteriaId": "8038D0FA-30FB-4BC1-A33D-6BE76C248D21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xq:*:*:*:*:*:*", "matchCriteriaId": "F5B5177C-98A7-42FF-83A8-8DFE33B28595", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xr:*:*:*:*:*:*", "matchCriteriaId": "19C09D13-4124-461C-9976-F7B141563532", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xs:*:*:*:*:*:*", "matchCriteriaId": "EE8EBF0C-7C7B-4C12-8135-0AB9957B7E19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xt:*:*:*:*:*:*", "matchCriteriaId": "09C89AB4-7060-401D-B8B1-A5969D843558", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xu:*:*:*:*:*:*", "matchCriteriaId": "A365C1C0-B014-42C9-A8B3-9D0C967DC9E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xv:*:*:*:*:*:*", "matchCriteriaId": "0A56B6C5-C50D-44CF-BF43-4EDEBDA19581", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:xw:*:*:*:*:*:*", "matchCriteriaId": "D5AE6379-25CE-44A1-BA61-2461DB0C0E89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ya:*:*:*:*:*:*", "matchCriteriaId": "907A6B20-721D-4756-840F-8A2EE776BDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yb:*:*:*:*:*:*", "matchCriteriaId": "DBD1A8F1-73AD-41A0-8426-158402875952", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yc:*:*:*:*:*:*", "matchCriteriaId": "0D431519-F500-408D-A79D-DAE2DF2F3A5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ye:*:*:*:*:*:*", "matchCriteriaId": "880952B0-E796-4C8A-9D28-900338B3C629", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yj:*:*:*:*:*:*", "matchCriteriaId": "B5D19A29-3500-4D69-B55F-16F6AF04CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yk:*:*:*:*:*:*", "matchCriteriaId": "ECD7F135-CFC7-42D4-A223-02D69B905E4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yl:*:*:*:*:*:*", "matchCriteriaId": "AE54DF91-7757-4676-A497-2FDE4B039367", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ym:*:*:*:*:*:*", "matchCriteriaId": "65F91BB4-5721-46B8-97D7-98467F7E1172", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yn:*:*:*:*:*:*", "matchCriteriaId": "582D94B0-5980-492A-A8BB-4C107521573C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yo:*:*:*:*:*:*", "matchCriteriaId": "A6DCA5A2-7CE2-4273-B548-AA63E8EBCA2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yp:*:*:*:*:*:*", "matchCriteriaId": "5A3625CC-B081-41DF-9C18-921C67FB4D95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yq:*:*:*:*:*:*", "matchCriteriaId": "59DBDE9C-1898-4D8C-B63F-0F962FDEA23C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yr:*:*:*:*:*:*", "matchCriteriaId": "C072D406-81E6-4FA8-82AC-47033F3229D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ys:*:*:*:*:*:*", "matchCriteriaId": "06193800-DE6B-4014-99A2-AE9AAFC11F64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yt:*:*:*:*:*:*", "matchCriteriaId": "A7ED5BF0-BC3A-467A-BF14-8FE3529FD6F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yu:*:*:*:*:*:*", "matchCriteriaId": "AC94BEC7-F050-4679-9331-9B7F679B2196", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yv:*:*:*:*:*:*", "matchCriteriaId": "9D21DF3F-4793-4F4A-94E7-C174EEC7CF61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yx:*:*:*:*:*:*", "matchCriteriaId": "FD47D76A-7F35-4B38-B479-FDA1EB09C35D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:yy:*:*:*:*:*:*", "matchCriteriaId": "A82F0863-9143-4390-A9C0-19DDB06C176E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:za:*:*:*:*:*:*", "matchCriteriaId": "D86A8DA9-D114-4BBE-90DE-F643C12EFB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zb:*:*:*:*:*:*", "matchCriteriaId": "DF7E107F-4805-4832-A013-A35D374FF07C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zc:*:*:*:*:*:*", "matchCriteriaId": "2223DB0D-E7DA-488A-96C2-8845946CEDA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zd:*:*:*:*:*:*", "matchCriteriaId": "5779F924-F313-427F-82F4-571E657B57F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ze:*:*:*:*:*:*", "matchCriteriaId": "9783B2B3-F735-4E96-8FAA-679D753CDC90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zf:*:*:*:*:*:*", "matchCriteriaId": "748B610B-7659-431E-BCB9-B7B5E72C0E89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zg:*:*:*:*:*:*", "matchCriteriaId": "98798701-533E-4255-9450-C6354B779EF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zh:*:*:*:*:*:*", "matchCriteriaId": "F69E5442-C31F-46C8-8911-F5B77437754A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zj:*:*:*:*:*:*", "matchCriteriaId": "E1D75842-3328-49A3-AC0E-C508CACE5C71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zp:*:*:*:*:*:*", "matchCriteriaId": "FA06B835-2324-47D4-A04D-D01FFA069A59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*", "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*", "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*", "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*", "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*", "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*", "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*", "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*", "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*", "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*", "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*", "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*", "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*", "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*", "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*", "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*", "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*", "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*", "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*", "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*", "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*", "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*", "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*", "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*", "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*", "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*", "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*", "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*", "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*", "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*", "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*", "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*", "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*", "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*", "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*", "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*", "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*", "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*", "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*", "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*", "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*", "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*", "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*", "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xl:*:*:*:*:*:*", "matchCriteriaId": "57C8EB63-52B5-4B16-8EA1-621790F70B7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xm:*:*:*:*:*:*", "matchCriteriaId": "61C80F8B-ADE8-4289-8D87-02C6284D5A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xn:*:*:*:*:*:*", "matchCriteriaId": "3CBBBBD1-496B-4C31-80B8-C217E915F077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xt:*:*:*:*:*:*", "matchCriteriaId": "07ED91C2-B8ED-4AE7-8A37-82DB94EE28A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xv:*:*:*:*:*:*", "matchCriteriaId": "CBDA82BB-93D1-436C-9598-0AF3FAC8CD26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xy:*:*:*:*:*:*", "matchCriteriaId": "8049D059-2A09-4820-A4F0-6B8D794606BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets." }, { "lang": "es", "value": "El componente data-link switching (DLSw) en Cisco IOS 12.0 hasta 12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo o consumo de memoria) a trav\u00e9s de 91 paquetes manipulados del (1) puerto UDP 2067 o (2) protocolo IP." } ], "id": "CVE-2008-1152", "lastModified": "2024-11-21T00:43:48.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-27T17:44:00.000", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/29507" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/28465" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1019712" }, { "source": "ykramarz@cisco.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-23 12:59
Modified
2024-11-21 02:30
Severity ?
Summary
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=39440 | Vendor Advisory | |
ykramarz@cisco.com | http://www.securityfocus.com/bid/75337 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1032692 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=39440 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75337 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032692 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "EA07E584-C010-485F-8BE3-A46DA40B997E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2\\(33\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AF0844A-5298-4470-80B8-0B82E67A359A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ubr10000_cable_modem_termination_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC98615A-29AC-454E-B4D9-222E8E85AD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051." }, { "lang": "es", "value": "Fuga de memoria en Cisco IOS 12.2 en el m\u00f3dulo Performance Routing Engine (PRE) en los dispositivos uBR10000 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda del proceso PXF) mediante el env\u00edo r\u00e1pido de solicitudes de SNMP docsIfMCmtsMib, tambi\u00e9n conocida como Bug ID CSCue65051." } ], "id": "CVE-2015-4204", "lastModified": "2024-11-21T02:30:37.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-23T12:59:01.367", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75337" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032692" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-27 10:44
Modified
2024-11-21 00:43
Severity ?
Summary
Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.1, 12.2, 12.3, and 12.4, with IPv4 UDP services and the IPv6 protocol enabled, allows remote attackers to cause a denial of service (device crash and possible blocked interface) via a crafted IPv6 packet to the device." }, { "lang": "es", "value": "Cisco IOS versiones 12.1, 12.2, 12.3 y 12.4, con servicios UDP de IPv4 y el protocolo IPv6 habilitado, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del dispositivo y posible interfaz bloqueada) por medio de un paquete IPv6 dise\u00f1ado para el dispositivo." } ], "id": "CVE-2008-1153", "lastModified": "2024-11-21T00:43:48.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-27T10:44:00.000", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/29507" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/936177" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/28461" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1019713" }, { "source": "ykramarz@cisco.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/936177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-10 18:32
Modified
2024-11-21 00:43
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE64E4C4-BACE-404F-966D-415976781DC4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "377F951F-C2D8-441D-A532-F62E23937F94", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*", "matchCriteriaId": "EB593071-BB5A-47AD-B9C6-59D2010F6280", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*", "matchCriteriaId": "6E2D6402-D2AF-4817-8A46-1FA9B17B720C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*", "matchCriteriaId": "2A419BD7-6345-43D8-B69C-2255E2EF6FD7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "69D2BD63-C110-4E89-B239-4A59E20AB78E", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*", "matchCriteriaId": "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6762126F-55E4-4963-99F5-206A46979E7C", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1945B97A-8276-4EE2-8F76-5F0C0956DF18", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2452913-0513-46BB-A52E-8FA12D77B570", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*", "matchCriteriaId": "5D967624-23B1-48BB-91DB-1E1C18AAAD85", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "77930529-89BE-463D-8259-3D67D153284A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "743DEB17-3BE3-4278-A54B-2CE547DB9F31", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2BCA127-F5F3-418F-890D-6B1C03019590", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BE83150C-456E-462A-A0F1-ED8EAD60D671", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BF5B2431-335C-461B-B07F-88267EA71DCD", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9DBA8E67-021A-4D07-94B9-943A8E1C4468", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "905D1F04-CDFD-4BAD-8939-5ABC70A874E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "00878E69-2721-43E3-A853-D3DCFE5C258D", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C51799BB-D931-436C-8C94-558956AC880A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D498D406-A453-4119-BBA1-4709CF5862AE", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D68555E-BEB9-4F1E-8D6D-C313FB501523", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B44A0D4-3020-414B-81D7-679E8441E182", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*", "matchCriteriaId": "B76A8BD4-E53F-49A6-946B-6E672DD0419C", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1C6B46B-13E2-4DA4-9EF2-007893034269", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "15D3471D-6267-4481-8BBD-BFC106E8F30B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0292228-80D8-4BA4-8662-698D7003D7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "522C9080-86A6-40A8-905C-73187DAF83F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B7A18-F230-44D4-801E-8284085CA1DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E62CC4C-89A7-4594-BDD8-394211889220", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*", "matchCriteriaId": "E152F995-BCD2-4725-A47C-1A5E7D6B9005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E38404-ED69-4B0E-A035-2AF5E0649CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0123D2ED-3983-45D3-B54A-3E75FCE99C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E50E974E-87F5-45A2-88BA-B1E4913E3DAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4AB25CC-BB96-4675-98D7-C5FF30C24014", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C7C95AD-3D5F-458B-A761-5D7779FEA327", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9E4A3F6-5D89-47D0-84AD-601682399D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C700A36D-5FB4-475D-BE85-74511830870A", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "02060365-1D67-4611-8D79-B9FC354EBF99", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "194BD880-F672-4492-8356-B14C8DA8C2DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1D769FC-3081-48F8-BBF1-3964F3F8B569", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A966DB26-8A52-4F4D-9C0E-8A8719A195AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6675DF0-963A-4091-9786-7CE3337EE47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "77A94931-8584-4021-A5BB-83FF22D54955", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F06FB120-9BB3-4363-B2A2-A3475993FDFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8229DE3A-B9CB-44FF-8409-51E09DDED479", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2699E7A6-7B3A-4C4C-9472-B8B6B547624D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D913348F-351C-4D78-A0AA-27B355D52235", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C3E88A46-CEC7-46D5-9697-232E18531FD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0ECFBAFE-9267-469A-A97F-F716969B247C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1559E6-E7B6-4B5B-8841-CF502E05BA46", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F041246F-5B7F-4F63-9E81-02465C9062C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADB78013-DEE9-438E-ABD1-5E3D932177BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D77447C3-AA72-4CAB-A0B1-0883D41AD064", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9C3F04F-7581-4DCA-970D-9FCBB56EA724", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ABF04A7-8230-4AB9-8D66-DF1463037823", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC205E36-7027-4A9B-8574-9BB9C68007A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "69C55DD7-986A-4AB6-8F61-5A5D26531011", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84DDD7E4-D5D7-4341-9482-2B918306578D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "14A3C59C-6A3D-477B-B425-1C085D6951E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "31AA57F4-5023-4333-9F19-C9D362E8E495", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "063034FF-0AB8-4D78-9822-0DCA9657C853", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "67477EC7-363E-45B5-BA53-1A4E9FB20CDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "78E11F95-E635-465C-BD7F-5F7E9192DEAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "74F145F0-573E-4CBC-AB69-3B77D6F9A540", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "49DA7D86-8845-43CA-80DC-3D794322CB28", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABD34FEB-7956-44AE-A510-2E5F9EF61651", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DEF5098-3791-4CEB-A436-2809A4385D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D895880-FB98-4472-A164-458CE086F339", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D7912AA3-0469-479E-9C5A-53F20E504956", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8677C6C8-39CA-492A-A196-9DFAF892120C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "22CE55DE-00CA-4F87-9CA0-80A360E332FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "63DC81FA-A6B4-41DC-8097-8944D06A2451", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB87853E-CAFF-48D8-9C56-A2DE325235D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "61E35451-BEE3-412A-8706-5522C00BE1DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F45326B3-CC4E-4C3A-9819-28936A0432F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDBF1A78-7190-4326-84BD-C18CC354DA38", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D97FFBA0-2E80-40EF-A4AC-F26D3490371E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A442F5B-5A1A-4CD0-B693-851FFB917E5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "646BF70F-CB7B-48E3-8563-E089E1CECD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CD34A7B-508C-45F2-8725-FE42398D3652", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2785732-A5C7-434E-B45D-13138B574F45", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A07E1241-24BE-48D3-B737-56B2AAA3AF64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB751FD-CCCA-4131-A24F-65DEF1128B26", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D106F4E4-4B41-4002-8C34-6A9C3A0FF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "863583DC-DD93-46DC-BA06-0B838CDB2565", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." }, { "lang": "es", "value": "Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte." } ], "id": "CVE-2008-0960", "lastModified": "2024-11-21T00:43:19.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-10T18:32:00.000", "references": [ { "source": "cret@cert.org", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "cret@cert.org", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "cret@cert.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/30612" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/35463" }, { "source": "cret@cert.org", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "cret@cert.org", "url": "http://securityreason.com/securityalert/3933" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "cret@cert.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "cret@cert.org", "url": "http://support.apple.com/kb/HT2163" }, { "source": "cret@cert.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "cret@cert.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "cret@cert.org", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "cret@cert.org", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "cret@cert.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "cret@cert.org", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "cret@cert.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "cret@cert.org", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT2163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*", "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*", "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*", "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*", "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*", "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*", "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*", "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*", "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*", "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*", "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*", "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*", "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*", "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*", "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*", "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*", "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*", "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*", "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*", "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*", "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*", "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*", "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*", "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*", "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*", "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*", "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*", "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*", "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*", "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*", "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*", "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*", "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*", "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*", "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*", "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*", "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*", "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*", "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*", "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*", "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*", "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*", "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*", "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en (1) la funcionalidad Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante paquetes MIPv6, conocido como Bug ID CSCsm97220." } ], "id": "CVE-2009-0633", "lastModified": "2024-11-21T01:00:34.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-27T16:30:02.030", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "ykramarz@cisco.com", "url": "http://securitytracker.com/id?1021898" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/34241" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*", "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*", "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*", "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*", "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*", "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*", "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*", "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*", "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*", "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*", "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*", "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*", "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*", "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*", "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*", "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*", "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*", "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*", "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*", "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*", "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*", "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*", "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*", "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*", "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*", "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*", "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*", "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*", "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*", "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*", "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*", "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*", "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*", "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*", "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*", "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*", "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*", "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*", "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*", "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*", "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*", "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*", "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*", "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak." }, { "lang": "es", "value": "Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB)." } ], "id": "CVE-2009-0628", "lastModified": "2024-11-21T01:00:33.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-27T16:30:01.967", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "ykramarz@cisco.com", "url": "http://securitytracker.com/id?1021896" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/34239" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-27 10:44
Modified
2024-11-21 00:43
Severity ?
Summary
Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create "extra multicast states on the core routers" via a crafted Multicast Distribution Tree (MDT) Data Join message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Multicast Virtual Private Network (MVPN) implementation in Cisco IOS 12.0, 12.2, 12.3, and 12.4 allows remote attackers to create \"extra multicast states on the core routers\" via a crafted Multicast Distribution Tree (MDT) Data Join message." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de la Red Privada Virtual Multicast (MVPN) en Cisco IOS 12.0, 12.2, 12.3, y 12.4 permite a atacantes remotos crear \"estados multicast extra en los routers core\" a trav\u00e9s de mensajes Multicast Distribution Tree (MDT) Data Join manipulados." } ], "id": "CVE-2008-1156", "lastModified": "2024-11-21T00:43:48.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-03-27T10:44:00.000", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/29507" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/28464" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1019715" }, { "source": "ykramarz@cisco.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1006/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" }, { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*", "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*", "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*", "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*", "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*", "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*", "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*", "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*", "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*", "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*", "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*", "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*", "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*", "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*", "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*", "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*", "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*", "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*", "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*", "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*", "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*", "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*", "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*", "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*", "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*", "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*", "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*", "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*", "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*", "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*", "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*", "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*", "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*", "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*", "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*", "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*", "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*", "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*", "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*", "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*", "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*", "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*", "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*", "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337." } ], "id": "CVE-2009-0634", "lastModified": "2024-11-21T01:00:34.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-27T16:30:02.063", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "ykramarz@cisco.com", "url": "http://securitytracker.com/id?1021898" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/34241" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }