All the vulnerabilites related to cisco - pix_501
cve-2010-1578
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 18:38
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:42.850Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-1578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-1578", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-04-27T00:00:00Z", "dateUpdated": "2024-09-16T18:38:41.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2816
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 16:43
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/42189 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.064Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42189", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42189" }, { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "42189", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42189" }, { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42189", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42189" }, { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2816", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-16T16:43:57.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0395
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025108 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/43488 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0493 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65590 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "asa-rip-dos(65590)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "asa-rip-dos(65590)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025108" }, { "name": "43488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "asa-rip-dos(65590)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0395", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0396
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025108 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65591 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/43488 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0493 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "asa-ca-unauth-access(65591)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0493" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "asa-ca-unauth-access(65591)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0493" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "1025108", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025108" }, { "name": "asa-ca-unauth-access(65591)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" }, { "name": "43488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0493" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0396", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2815
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 20:58
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/42198 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42198", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42198" }, { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "42198", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42198" }, { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "42198", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42198" }, { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2815", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-16T20:58:54.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1580
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 17:43
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-1580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-1580", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-04-27T00:00:00Z", "dateUpdated": "2024-09-16T17:43:02.852Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2814
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 18:28
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/42196 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "42196", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42196" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "42196", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42196" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "42196", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42196" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2814", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-16T18:28:23.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2817
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-17 00:00
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/42190 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "42190", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42190" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "42190", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42190" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2817", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "42190", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42190" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2817", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-17T00:00:51.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1581
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 20:23
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/42187 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "name": "42187", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "name": "42187", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-1581", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "name": "42187", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42187" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-1581", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-04-27T00:00:00Z", "dateUpdated": "2024-09-16T20:23:00.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1579
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 22:51
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40842 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:42.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40842", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-1579", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40842", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40842" }, { "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-1579", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-04-27T00:00:00Z", "dateUpdated": "2024-09-16T22:51:20.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.17), y v8.3 anteriores a v8.3(1.6) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtf37506." } ], "id": "CVE-2010-2814", "lastModified": "2024-11-21T01:17:25.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.533", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/42196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42196" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.10), y v8.3 anteriores a v8.3(1.1) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtf55259." } ], "id": "CVE-2010-2815", "lastModified": "2024-11-21T01:17:25.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.567", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/42198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42198" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | adaptive_security_appliance | 8.0\(2\) | |
cisco | adaptive_security_appliance | 8.0\(3\) | |
cisco | adaptive_security_appliance | 8.0\(4\) | |
cisco | adaptive_security_appliance | 8.0\(5\) | |
cisco | adaptive_security_appliance | 8.1\(1\) | |
cisco | adaptive_security_appliance | 8.1\(2\) | |
cisco | adaptive_security_appliance | 8.2 | |
cisco | adaptive_security_appliance | 8.2\(1\) | |
cisco | adaptive_security_appliance | 8.2\(2\) | |
cisco | adaptive_security_appliance_software | 8.0 | |
cisco | asa_5500 | * | |
cisco | asa_5505 | * | |
cisco | asa_5510 | * | |
cisco | asa_5520 | * | |
cisco | asa_5540 | * | |
cisco | asa_5550 | * | |
cisco | asa_5580 | * | |
cisco | pix_500 | * | |
cisco | pix_501 | * | |
cisco | pix_506e | * | |
cisco | pix_firewall_506 | * | |
cisco | pix_firewall_515 | * | |
cisco | pix_firewall_520 | * | |
cisco | pix_firewall_525 | * | |
cisco | pix_firewall_535 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SIP en Cisco Adaptive Security Appliances (ASA) para dispositivos serie 5500 con software v8.0 anteriores a v8.0(5.17), v8.1 anteriores a v8.1(2.45), y v8.2 anteriores a v8.2(2.13), permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCtd32106." } ], "id": "CVE-2010-2816", "lastModified": "2024-11-21T01:17:25.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.597", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/42189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42189" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:14
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC UDP manipulados, tambi\u00e9n conocido como Bug ID CSCtc77567." } ], "id": "CVE-2010-1578", "lastModified": "2024-11-21T01:14:43.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:16.097", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9952F1BC-68BD-4B32-8707-2A0F185423AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "29ADB7E0-9436-4479-B2FF-6241BA6DB4A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2D2FF90-7A70-464F-A859-1A31F1FF6514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD8078B-570C-4449-97D3-B903B19BAEA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A70C710-CFC6-4503-B2EC-E50DF38CEC76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C0BDBB7B-2CB1-4F93-861D-BD4962527259", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AAF282A0-9335-44FA-9849-C5273B4E519E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "C2064D5C-1068-4889-9EB9-1E92D40D60BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9182D1E9-7F10-4C00-89E9-2142551464DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A7DB5368-63F1-4D55-A9CE-12F307F1CBE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.0 anteriores a v7.0(8.11), v7.1 y v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.10), y v8.3 anteriores a v8.3(1.1) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes IKE manipulados, tambi\u00e9n conocido como Bug ID CSCte46507." } ], "id": "CVE-2010-2817", "lastModified": "2024-11-21T01:17:26.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.627", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/42190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42190" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | adaptive_security_appliance | 8.0\(2\) | |
cisco | adaptive_security_appliance | 8.0\(3\) | |
cisco | adaptive_security_appliance | 8.0\(4\) | |
cisco | adaptive_security_appliance | 8.0\(5\) | |
cisco | adaptive_security_appliance | 8.1\(1\) | |
cisco | adaptive_security_appliance | 8.1\(2\) | |
cisco | adaptive_security_appliance | 8.2 | |
cisco | adaptive_security_appliance | 8.2\(1\) | |
cisco | adaptive_security_appliance | 8.2\(2\) | |
cisco | adaptive_security_appliance | 8.3 | |
cisco | adaptive_security_appliance_software | 8.0 | |
cisco | adaptive_security_appliance_software | 8.3\(1\) | |
cisco | asa_5500 | * | |
cisco | asa_5505 | * | |
cisco | asa_5510 | * | |
cisco | asa_5520 | * | |
cisco | asa_5540 | * | |
cisco | asa_5550 | * | |
cisco | asa_5580 | * | |
cisco | pix_500 | * | |
cisco | pix_501 | * | |
cisco | pix_506e | * | |
cisco | pix_firewall_506 | * | |
cisco | pix_firewall_515 | * | |
cisco | pix_firewall_520 | * | |
cisco | pix_firewall_525 | * | |
cisco | pix_firewall_535 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583." }, { "lang": "es", "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.0 anterior a v8.0 (5.20), v8.1 anterior a v8.1 (2.48), v8.2 anterior a v8.2 (3), y v8.3 anterior a v8.3 (2.1), cuando el protocolo RIP y la funcionalidad Cisco Phone est\u00e1n configuradas, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una actualizaci\u00f3n RIP, tambi\u00e9n conocido como error ID CSCtg66583" } ], "id": "CVE-2011-0395", "lastModified": "2024-11-21T01:23:52.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:19.260", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/43488" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | adaptive_security_appliance | 8.0\(2\) | |
cisco | adaptive_security_appliance | 8.0\(3\) | |
cisco | adaptive_security_appliance | 8.0\(4\) | |
cisco | adaptive_security_appliance | 8.0\(5\) | |
cisco | adaptive_security_appliance | 8.1\(1\) | |
cisco | adaptive_security_appliance | 8.1\(2\) | |
cisco | adaptive_security_appliance | 8.2 | |
cisco | adaptive_security_appliance | 8.2\(1\) | |
cisco | adaptive_security_appliance | 8.2\(2\) | |
cisco | adaptive_security_appliance | 8.3 | |
cisco | adaptive_security_appliance_software | 8.0 | |
cisco | adaptive_security_appliance_software | 8.3\(1\) | |
cisco | asa_5500 | * | |
cisco | asa_5505 | * | |
cisco | asa_5510 | * | |
cisco | asa_5520 | * | |
cisco | asa_5540 | * | |
cisco | asa_5550 | * | |
cisco | asa_5580 | * | |
cisco | pix_500 | * | |
cisco | pix_501 | * | |
cisco | pix_506e | * | |
cisco | pix_firewall_506 | * | |
cisco | pix_firewall_515 | * | |
cisco | pix_firewall_520 | * | |
cisco | pix_firewall_525 | * | |
cisco | pix_firewall_535 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352." }, { "lang": "es", "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.0 anterior a v8.0 (5.23), v8.1 anterior a v8.1 (2.49), v8.2 anterior a v8.2 (4.1), y v8.3 anterior a v8.3 (2.13), cuando una entidad emisora de certificados (CA) est\u00e1 configurada, permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como error ID CSCtk12352" } ], "id": "CVE-2011-0396", "lastModified": "2024-11-21T01:23:52.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:19.307", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/43488" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:14
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCtc85753." } ], "id": "CVE-2010-1580", "lastModified": "2024-11-21T01:14:43.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:16.207", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:14
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.17), y v8.3 anteriores a v8.3(1.6) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtd32627." } ], "id": "CVE-2010-1581", "lastModified": "2024-11-21T01:14:43.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:16.253", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/42187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42187" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:14
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*", "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*", "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*", "matchCriteriaId": "151D5A44-2D0D-478A-B011-A0892817B814", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*", "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*", "matchCriteriaId": "286199EA-71CF-46B4-9131-F1752C2EA82D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*", "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*", "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC UDP manipulados, tambi\u00e9n conocido como Bug ID CSCtc79922." } ], "id": "CVE-2010-1579", "lastModified": "2024-11-21T01:14:43.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:16.177", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }