cve-2005-3669
Vulnerability from cvelistv5
Published
2005-11-18 21:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015200", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015200" }, { "name": "1015202", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015202" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "1015201", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015201" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "15401", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15401" }, { "name": "VU#226364", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "1015199", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015199" }, { "name": "oval:org.mitre.oval:def:5226", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226" }, { "name": "1015198", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015198" }, { "name": "20051114 Multiple Vulnerabilities Found by PROTOS IPSec Test Suite", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml" }, { "name": "17553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17553" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015200", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015200" }, { "name": "1015202", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015202" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "1015201", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015201" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "15401", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15401" }, { "name": "VU#226364", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "1015199", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015199" }, { "name": "oval:org.mitre.oval:def:5226", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226" }, { "name": "1015198", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015198" }, { "name": "20051114 Multiple Vulnerabilities Found by PROTOS IPSec Test Suite", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml" }, { "name": "17553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17553" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015200", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015200" }, { "name": "1015202", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015202" }, { "name": "http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en" }, { "name": "http://jvn.jp/niscc/NISCC-273756/index.html", "refsource": "MISC", "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "1015201", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015201" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "15401", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15401" }, { "name": "VU#226364", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "1015199", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015199" }, { "name": "oval:org.mitre.oval:def:5226", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226" }, { "name": "1015198", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015198" }, { "name": "20051114 Multiple Vulnerabilities Found by PROTOS IPSec Test Suite", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml" }, { "name": "17553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17553" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3669", "datePublished": "2005-11-18T21:00:00", "dateReserved": "2005-11-18T00:00:00", "dateUpdated": "2024-08-07T23:17:23.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9CAFC15-178C-4176-9668-D4A04B63E77B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C8D6949-89F4-40EF-98F4-8D15628DC345\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:1.1_\\\\(3.005\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:2.1_\\\\(0.208\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6479D85C-1A12-486D-818C-6679F415CA26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"923949D1-06EC-462F-A3BC-FCAB448042A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"901B1838-7169-41E5-80EF-29BB680BF937\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDAEAA5F-0A98-48B7-8012-9B9909243135\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11DA4B03-2D30-4514-9DF5-5F0DDD4B8DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB38834B-E4AB-43F4-888B-14B088C95594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23F8059B-3968-4D63-B1B3-74E545C918D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"701CDA0D-F932-4251-B484-8F20F0AE9003\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E674AA43-905E-40E0-A70F-77D05C62C18D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F0D767F-7142-46D2-B3E4-7FE8E9E3285A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"057A6BA0-5F5E-4FC4-B2EC-A17968EAC2C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"645AB682-2965-4C8D-B323-AB510E424407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\\\(rel\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76F7F019-A0A4-49CD-BB28-24BF7725AC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"175CD875-3402-4B06-A3FA-7DFFCBB44056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF61B8A5-31E7-40F5-8B3D-CA90E50618AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C9017BB-5848-4361-ABB9-C69FB3AB90FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\\\(rel\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"207034E8-35F7-4E78-A3FC-C86D20EB8D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C544E523-15E5-4CE5-8113-53454F5D9973\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B09F6EBD-C3FC-4680-BE31-A766D863237D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF8C3FDA-D321-4202-A8EA-6C1464558A8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B68705AB-A133-401F-9F41-64594E071816\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9092680-E154-4EAB-A2D5-B692073F894E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EF5F3FA-5FA4-408E-BA62-3943C5DFD859\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADFC9764-5BF5-449F-9200-5569C13F8309\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80709CB0-D386-4C4F-B3EE-7A0501FD7248\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36291ADE-3D5A-4E49-8BA7-B71CAAA226B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D953DA9F-B54E-4941-85BE-48933C98DB55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12E298AD-26AC-4E1D-83D8-5C2016CC6559\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71DAF71-5763-44D8-AD1E-5ADE8BC15120\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFA54782-93A8-47BE-863D-89CA3678BF6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F66A10-246D-447B-941F-F1175684F0D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82435757-D892-4298-9176-5EC1FEC93037\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A90348C-94E2-4F04-A887-E7EFFC1ACF12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F5E136E-9215-46A8-A40A-AE964C588A38\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0C3B413-76F7-413B-A51F-29834F9DE722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EC2D158-6174-4AE8-83DA-125B072B6980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5688D88-A550-43EB-8854-2E132EC71156\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2E3044F-3CE8-4970-9A7F-FDF555F622A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB57AAA9-4715-468F-A734-A12209A6069F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86B9E611-3F06-424C-96EF-EE4997C70AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98FE195E-084B-4F4C-800D-850165DED48C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB74F350-37F8-48DF-924E-415E51932163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E618BF54-56DC-40FC-A515-3BFB4366F823\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1976E53-85A6-494F-B8AC-847E7988850C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"520304A4-EB15-42A8-A402-8251A4D2076D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA88C064-898F-4C0D-A266-D7B3509C28A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"139B1182-61A3-4F3D-9E29-758F27917646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CC3706F-B00A-405E-917E-7FD5217E0501\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2595DCBA-E6F2-4551-A804-4DBB137F076B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8711A47-ABD5-40ED-847A-8D1663E3D819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:pix_firewall:6.2.3_\\\\(110\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900DC321-4CEF-4810-8247-B82FE93F48BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:pix_firewall:6.3.3_\\\\(133\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"422F8E64-2376-4E82-A1A2-916BFB7172AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F2ED90B-DDBA-49DE-AC78-20E7D77C8858\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:mds_9000_san-os:1.3\\\\(3.33\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7E572F2-64A1-4188-B8BF-56B7DAFAD2D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:mds_9000_san-os:1.3\\\\(4a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"994EF979-3A4A-4910-8CE7-C15BC0D05A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:mds_9000_san-os:2.0\\\\(0.86\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C92F3035-2D2A-475E-98A7-35FE965138A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026A2C0D-AD93-49DC-AF72-8C12AD565B2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"920FAF7C-2964-497B-B1F8-3B060AAB4C55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D499F38-A34C-44D0-A061-C3AE08CF178B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63E564B5-A39F-4837-93B8-1331CD975D4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.1\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EEDB9DD-C862-4783-9F96-88836424B298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.1\\\\(6b\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BD36C4A-4B90-4012-B4A5-6081C413E302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C39A993C-5A36-4D3F-B8B6-9B3252713127\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1C4F7D5-DCD0-409C-86BF-A96A5253DF64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8198D129-76D0-4983-BFC4-8EC724FE1B6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BEECFAA-9DD5-4950-B9F1-CF8582225314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49566EAC-05AF-4880-8000-351AF538E4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23E9FBEE-3213-47FA-8CBA-C285533265FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"118CBF59-DAD8-468E-B279-F6359E4624F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(7.202\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"957E6F8F-6881-44DE-A687-9D1E0C13F6CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E56328FE-F499-4325-AFEC-45BFEAB7662D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AA2E425-904C-4070-8F5F-B81BCF3147F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"604CF950-5D4B-4DC6-819E-0528B22CB05C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.1\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E12887E5-A2BB-4B1E-9621-2961458BCE21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.1\\\\(4.206\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B5BE2F7-687C-477B-818B-A102526DF36D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"999A0969-60EB-4B2E-A274-9F05D9F840E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"626E41D2-A5EF-493D-9486-3D9BC3793EAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBA31E4D-2215-4E4A-BCCC-B3D922CB752D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(3.210\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F16AD2C-1CC1-43D9-A944-F67071B62E66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25D16481-CA9A-4B4D-AC9D-3A4F0387FF19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56E4588E-6C1F-4720-8082-0EF299435CB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D24E0E92-59D7-4B16-8B0D-2FD0EE821D93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED24C763-7558-4AC0-AE10-FDA3D3078D27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(1.200\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C84CE24E-4ED6-43D0-A234-FBD24D22A8A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72C3E2B4-3A36-44B5-90D3-1BF9FAD98579\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58BE9C02-2A01-4F6F-A6BD-BC0173561E9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C558CED8-8342-46CB-9F52-580B626D320E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F85D19E-6C26-429D-B876-F34238B9DAAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4.101\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09063867-0E64-4630-B35B-4CCA348E4DAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78F98CD7-A352-483C-9968-8FB2627A7CBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F97FE485-705F-4707-B6C6-0EF9E8A85D5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2B925E8-D2C2-4E8C-AC21-0C422245C482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9170562-872E-4C32-869C-B10FF35A925E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0927A68-8BB2-4F03-8396-E9CACC158FC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"559DDBA3-2AF4-4A0C-B219-6779BA931F21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.1.5\\\\(104\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F76AED68-8304-4BC6-9D98-64231B08A6A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5226C9CC-6933-4F10-B426-B47782C606FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757DAE9A-B25D-4B8A-A41B-66C2897B537E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E3DC170-E279-4725-B9EE-6840B5685CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3.100\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8091EDA9-BD18-47F7-8CEC-E086238647C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F867890-74A4-4892-B99A-27DB4603B873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE05B514-F094-4632-B25B-973F976F6409\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3392428D-1A85-4472-A276-C482A78E2CE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.102\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40954985-16E6-4F37-B014-6A55166AE093\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.109\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C097809-1FEF-4417-A201-42291CC29122\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.\"}]", "id": "CVE-2005-3669", "lastModified": "2024-11-21T00:02:23.827", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2005-11-18T21:03:00.000", "references": "[{\"url\": \"http://jvn.jp/niscc/NISCC-273756/index.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/17553\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1015198\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1015199\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1015200\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1015201\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1015202\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/226364\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/15401\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvn.jp/niscc/NISCC-273756/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/17553\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1015198\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1015199\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1015200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1015201\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1015202\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/226364\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/15401\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2005-3669\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-11-18T21:03:00.000\",\"lastModified\":\"2024-11-21T00:02:23.827\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CAFC15-178C-4176-9668-D4A04B63E77B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C8D6949-89F4-40EF-98F4-8D15628DC345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1_\\\\(3.005\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:2.1_\\\\(0.208\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6479D85C-1A12-486D-818C-6679F415CA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923949D1-06EC-462F-A3BC-FCAB448042A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"901B1838-7169-41E5-80EF-29BB680BF937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAEAA5F-0A98-48B7-8012-9B9909243135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DA4B03-2D30-4514-9DF5-5F0DDD4B8DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB38834B-E4AB-43F4-888B-14B088C95594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F8059B-3968-4D63-B1B3-74E545C918D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"701CDA0D-F932-4251-B484-8F20F0AE9003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E674AA43-905E-40E0-A70F-77D05C62C18D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F0D767F-7142-46D2-B3E4-7FE8E9E3285A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057A6BA0-5F5E-4FC4-B2EC-A17968EAC2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"645AB682-2965-4C8D-B323-AB510E424407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\\\(rel\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F7F019-A0A4-49CD-BB28-24BF7725AC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"175CD875-3402-4B06-A3FA-7DFFCBB44056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF61B8A5-31E7-40F5-8B3D-CA90E50618AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C9017BB-5848-4361-ABB9-C69FB3AB90FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\\\(rel\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207034E8-35F7-4E78-A3FC-C86D20EB8D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C544E523-15E5-4CE5-8113-53454F5D9973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09F6EBD-C3FC-4680-BE31-A766D863237D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF8C3FDA-D321-4202-A8EA-6C1464558A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B68705AB-A133-401F-9F41-64594E071816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9092680-E154-4EAB-A2D5-B692073F894E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EF5F3FA-5FA4-408E-BA62-3943C5DFD859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC9764-5BF5-449F-9200-5569C13F8309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80709CB0-D386-4C4F-B3EE-7A0501FD7248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36291ADE-3D5A-4E49-8BA7-B71CAAA226B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D953DA9F-B54E-4941-85BE-48933C98DB55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E298AD-26AC-4E1D-83D8-5C2016CC6559\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71DAF71-5763-44D8-AD1E-5ADE8BC15120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA54782-93A8-47BE-863D-89CA3678BF6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F66A10-246D-447B-941F-F1175684F0D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82435757-D892-4298-9176-5EC1FEC93037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A90348C-94E2-4F04-A887-E7EFFC1ACF12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5E136E-9215-46A8-A40A-AE964C588A38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C3B413-76F7-413B-A51F-29834F9DE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC2D158-6174-4AE8-83DA-125B072B6980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5688D88-A550-43EB-8854-2E132EC71156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E3044F-3CE8-4970-9A7F-FDF555F622A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB57AAA9-4715-468F-A734-A12209A6069F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B9E611-3F06-424C-96EF-EE4997C70AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FE195E-084B-4F4C-800D-850165DED48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74F350-37F8-48DF-924E-415E51932163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E618BF54-56DC-40FC-A515-3BFB4366F823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1976E53-85A6-494F-B8AC-847E7988850C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520304A4-EB15-42A8-A402-8251A4D2076D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139B1182-61A3-4F3D-9E29-758F27917646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC3706F-B00A-405E-917E-7FD5217E0501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8711A47-ABD5-40ED-847A-8D1663E3D819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:pix_firewall:6.2.3_\\\\(110\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900DC321-4CEF-4810-8247-B82FE93F48BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:pix_firewall:6.3.3_\\\\(133\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"422F8E64-2376-4E82-A1A2-916BFB7172AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2ED90B-DDBA-49DE-AC78-20E7D77C8858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:mds_9000_san-os:1.3\\\\(3.33\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E572F2-64A1-4188-B8BF-56B7DAFAD2D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:mds_9000_san-os:1.3\\\\(4a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"994EF979-3A4A-4910-8CE7-C15BC0D05A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:mds_9000_san-os:2.0\\\\(0.86\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C92F3035-2D2A-475E-98A7-35FE965138A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026A2C0D-AD93-49DC-AF72-8C12AD565B2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"920FAF7C-2964-497B-B1F8-3B060AAB4C55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D499F38-A34C-44D0-A061-C3AE08CF178B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E564B5-A39F-4837-93B8-1331CD975D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.1\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EEDB9DD-C862-4783-9F96-88836424B298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.1\\\\(6b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD36C4A-4B90-4012-B4A5-6081C413E302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39A993C-5A36-4D3F-B8B6-9B3252713127\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C4F7D5-DCD0-409C-86BF-A96A5253DF64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8198D129-76D0-4983-BFC4-8EC724FE1B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEECFAA-9DD5-4950-B9F1-CF8582225314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49566EAC-05AF-4880-8000-351AF538E4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E9FBEE-3213-47FA-8CBA-C285533265FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118CBF59-DAD8-468E-B279-F6359E4624F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(7.202\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957E6F8F-6881-44DE-A687-9D1E0C13F6CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:4.4\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E56328FE-F499-4325-AFEC-45BFEAB7662D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA2E425-904C-4070-8F5F-B81BCF3147F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604CF950-5D4B-4DC6-819E-0528B22CB05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E12887E5-A2BB-4B1E-9621-2961458BCE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.1\\\\(4.206\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B5BE2F7-687C-477B-818B-A102526DF36D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"999A0969-60EB-4B2E-A274-9F05D9F840E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"626E41D2-A5EF-493D-9486-3D9BC3793EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA31E4D-2215-4E4A-BCCC-B3D922CB752D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(3.210\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F16AD2C-1CC1-43D9-A944-F67071B62E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D16481-CA9A-4B4D-AC9D-3A4F0387FF19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E4588E-6C1F-4720-8082-0EF299435CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.2\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24E0E92-59D7-4B16-8B0D-2FD0EE821D93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED24C763-7558-4AC0-AE10-FDA3D3078D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(1.200\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84CE24E-4ED6-43D0-A234-FBD24D22A8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:5.3\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72C3E2B4-3A36-44B5-90D3-1BF9FAD98579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BE9C02-2A01-4F6F-A6BD-BC0173561E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C558CED8-8342-46CB-9F52-580B626D320E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F85D19E-6C26-429D-B876-F34238B9DAAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4.101\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09063867-0E64-4630-B35B-4CCA348E4DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F98CD7-A352-483C-9968-8FB2627A7CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F97FE485-705F-4707-B6C6-0EF9E8A85D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B925E8-D2C2-4E8C-AC21-0C422245C482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9170562-872E-4C32-869C-B10FF35A925E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0927A68-8BB2-4F03-8396-E9CACC158FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"559DDBA3-2AF4-4A0C-B219-6779BA931F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1.5\\\\(104\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76AED68-8304-4BC6-9D98-64231B08A6A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226C9CC-6933-4F10-B426-B47782C606FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757DAE9A-B25D-4B8A-A41B-66C2897B537E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3DC170-E279-4725-B9EE-6840B5685CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8091EDA9-BD18-47F7-8CEC-E086238647C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F867890-74A4-4892-B99A-27DB4603B873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE05B514-F094-4632-B25B-973F976F6409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3392428D-1A85-4472-A276-C482A78E2CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.102\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40954985-16E6-4F37-B014-6A55166AE093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.109\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C097809-1FEF-4417-A201-42291CC29122\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/niscc/NISCC-273756/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17553\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015198\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015199\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015200\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015201\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1015202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/226364\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/15401\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/niscc/NISCC-273756/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17553\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015199\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/226364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/15401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.