Search criteria
4 vulnerabilities found for dslterminator by lucent
VAR-200212-0097
Vulnerability from variot - Updated: 2023-12-18 12:24Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response. Several Lucent Router product lines include support for a configuration tool which communicates over UDP on port 9. If a specially crafted packet is sent to some of these devices on UDP port 9, a response is issued which contains sensitive information. This information may be of aid in further attacks against the network or device
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200212-0097",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "5.0"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "4.0"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "3.0"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "2.0"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "1.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "5.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "4.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "3.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 1.9,
"vendor": "lucent",
"version": "2.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 1.6,
"vendor": "lucent",
"version": "5.0_ap48"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.3,
"vendor": "lucent",
"version": "6.0.2"
},
{
"model": "ascend pipeline router",
"scope": "eq",
"trust": 1.3,
"vendor": "lucent",
"version": "6.0"
},
{
"model": "dslterminator",
"scope": "eq",
"trust": 1.0,
"vendor": "lucent",
"version": "*"
},
{
"model": "dslterminator",
"scope": null,
"trust": 0.3,
"vendor": "lucent",
"version": null
},
{
"model": "ascend max router ap48",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "5.0"
},
{
"model": "ascend max router",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "1.0"
},
{
"model": "pipeline .0a",
"scope": "eq",
"trust": 0.3,
"vendor": "ascend",
"version": "5.0"
},
{
"model": "max .0ap42",
"scope": "eq",
"trust": 0.3,
"vendor": "ascend",
"version": "5.0"
},
{
"model": "ascend tnt router",
"scope": "ne",
"trust": 0.3,
"vendor": "lucent",
"version": "2.0.3"
},
{
"model": "ascend tnt router",
"scope": "ne",
"trust": 0.3,
"vendor": "lucent",
"version": "2.0"
},
{
"model": "ascend tnt router",
"scope": "ne",
"trust": 0.3,
"vendor": "lucent",
"version": "1.0"
}
],
"sources": [
{
"db": "BID",
"id": "5335"
},
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_max_router:5.0_ap48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:dslterminator:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-2148"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Published by FX",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
],
"trust": 0.6
},
"cve": "CVE-2002-2148",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-6531",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2002-2148",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2002-2148",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200212-584",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-6531",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2002-2148",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-6531"
},
{
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response. Several Lucent Router product lines include support for a configuration tool which communicates over UDP on port 9. \nIf a specially crafted packet is sent to some of these devices on UDP port 9, a response is issued which contains sensitive information. This information may be of aid in further attacks against the network or device",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "BID",
"id": "5335"
},
{
"db": "VULHUB",
"id": "VHN-6531"
},
{
"db": "VULMON",
"id": "CVE-2002-2148"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "5335",
"trust": 2.1
},
{
"db": "NVD",
"id": "CVE-2002-2148",
"trust": 1.8
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584",
"trust": 0.7
},
{
"db": "XF",
"id": "9",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20020727 PHENOELIT ADVISORY 0815 ++ ** ASCEND",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-6531",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2002-2148",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-6531"
},
{
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"db": "BID",
"id": "5335"
},
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"id": "VAR-200212-0097",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-6531"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:24:25.989000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-2148"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/5335"
},
{
"trust": 1.8,
"url": "http://online.securityfocus.com/archive/1/284650"
},
{
"trust": 1.8,
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"trust": 0.3,
"url": "http://www.lucent.com"
},
{
"trust": 0.3,
"url": "http://www.phenoelit.de/stuff/lucent_ascend.txt"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-6531"
},
{
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"db": "BID",
"id": "5335"
},
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-6531"
},
{
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"db": "BID",
"id": "5335"
},
{
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-6531"
},
{
"date": "2002-12-31T00:00:00",
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"date": "2002-07-27T00:00:00",
"db": "BID",
"id": "5335"
},
{
"date": "2002-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"date": "2002-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-09-05T00:00:00",
"db": "VULHUB",
"id": "VHN-6531"
},
{
"date": "2008-09-05T00:00:00",
"db": "VULMON",
"id": "CVE-2002-2148"
},
{
"date": "2002-07-27T00:00:00",
"db": "BID",
"id": "5335"
},
{
"date": "2008-09-05T20:32:27.417000",
"db": "NVD",
"id": "CVE-2002-2148"
},
{
"date": "2006-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Lucent router UDP port 9 Information disclosure vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "5335"
},
{
"db": "CNNVD",
"id": "CNNVD-200212-584"
}
],
"trust": 0.9
}
}
CVE-2002-2148 (GCVE-0-2002-2148)
Vulnerability from cvelistv5 – Published: 2005-11-16 21:17 – Updated: 2024-09-16 22:52
VLAI?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "lucent-port9-information-disclosure(9704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/284650"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2148",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T22:52:13.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-2148 (GCVE-0-2002-2148)
Vulnerability from nvd – Published: 2005-11-16 21:17 – Updated: 2024-09-16 22:52
VLAI?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "lucent-port9-information-disclosure(9704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/284650"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "lucent-port9-information-disclosure(9704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"name": "5335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"name": "20020727 Phenoelit ADvisory 0815 ++ ** Ascend",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/284650"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2148",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T22:52:13.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2002-2148
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| lucent | ascend_max_router | 2.0 | |
| lucent | ascend_max_router | 3.0 | |
| lucent | ascend_max_router | 4.0 | |
| lucent | ascend_max_router | 5.0 | |
| lucent | ascend_max_router | 5.0_ap48 | |
| lucent | ascend_pipeline_router | 1.0 | |
| lucent | ascend_pipeline_router | 2.0 | |
| lucent | ascend_pipeline_router | 3.0 | |
| lucent | ascend_pipeline_router | 4.0 | |
| lucent | ascend_pipeline_router | 5.0 | |
| lucent | ascend_pipeline_router | 6.0 | |
| lucent | ascend_pipeline_router | 6.0.2 | |
| lucent | dslterminator | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98D08C67-F634-41DB-AB33-B029A4AB9417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C90F2EE-AE20-4D17-9DC9-01C84BBE7696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A06F55-2174-4825-A348-A6D65F94C7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "627B08BB-DC4E-49F3-AE22-CD50906FB337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_max_router:5.0_ap48:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2DD62A-F471-4664-98F7-FDCCEAEB7F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2DCBCB-4B58-4463-B8D5-DABC654AD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "703FD9A7-8E68-4DC8-B4C6-346BDED1FEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D064ECCA-FFBA-4932-9803-5F939B9451ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF57770-EC66-4E2B-8A8C-817854BCBBB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3583D347-AED3-4469-8D36-1C873A7E4459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D182FD25-327B-4B7C-89B3-5A91053C5666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:ascend_pipeline_router:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCA3F19-31BF-4E92-ABC1-75148D6298EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:lucent:dslterminator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C20CA752-C161-465B-A4AC-D25165F8E7EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response."
}
],
"id": "CVE-2002-2148",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://online.securityfocus.com/archive/1/284650"
},
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/5335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://online.securityfocus.com/archive/1/284650"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/9704.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/5335"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}