CVE-2009-0626 (GCVE-0-2009-0626)
Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:40:05.100Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "oval:org.mitre.oval:def:6919",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ios-sslvpn-dos(49425)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34239",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "oval:org.mitre.oval:def:6919",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
},
{
"name": "34438",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ios-sslvpn-dos(49425)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
},
{
"name": "ADV-2009-0851",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0626",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"name": "34239",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34239"
},
{
"name": "oval:org.mitre.oval:def:6919",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
},
{
"name": "34438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34438"
},
{
"name": "1021896",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021896"
},
{
"name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
},
{
"name": "ios-sslvpn-dos(49425)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
},
{
"name": "ADV-2009-0851",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0851"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-0626",
"datePublished": "2009-03-27T16:00:00",
"dateReserved": "2009-02-18T00:00:00",
"dateUpdated": "2024-08-07T04:40:05.100Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0668C45B-9D25-424B-B876-C1721BFFE5DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"292F6F99-19B3-4106-A432-5DE916CCDD56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40183EF8-BD19-49AD-9E55-7FCCA635327F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8E40D5D-F46E-4098-A46A-1A52A343310D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D73E5138-016A-48EC-A367-3D3285AAFED2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C114F1A6-5DFE-408F-B83A-E8B9D4AF9791\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD5C082-9730-466D-A4A8-E4EEE5F3730D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CF419BD-8474-4F33-9CDD-587E341ABA8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"332B0446-4D8B-414B-B572-84B45D5643AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D40FB896-E20C-46B1-BF59-FBB42295F9C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0C3B413-76F7-413B-A51F-29834F9DE722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B418CFDD-AF36-46F9-B347-B34E72100F95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9F12741-69FB-46DD-A670-8461492B338A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EC2D158-6174-4AE8-83DA-125B072B6980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68FC4904-1F4D-4E10-AF95-911B07827598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86B9E611-3F06-424C-96EF-EE4997C70AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98FE195E-084B-4F4C-800D-850165DED48C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB74F350-37F8-48DF-924E-415E51932163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E618BF54-56DC-40FC-A515-3BFB4366F823\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1976E53-85A6-494F-B8AC-847E7988850C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A668D08-14C4-4438-A59C-CE60498BEF8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"520304A4-EB15-42A8-A402-8251A4D2076D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA88C064-898F-4C0D-A266-D7B3509C28A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"139B1182-61A3-4F3D-9E29-758F27917646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CC3706F-B00A-405E-917E-7FD5217E0501\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2595DCBA-E6F2-4551-A804-4DBB137F076B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1938D118-C07F-4BEC-8030-947F099BFCB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EB2B390-A39F-4082-BBCB-712BDD95886D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F782741-0F18-4FBC-9D00-AAABB8BC6A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACB11851-BCF8-485B-91F9-6A39B2354826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DFE3FC0-79BC-4549-98BA-235A53719F82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4691CEAD-47F1-4A97-84A4-72B794D3F714\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4A28452-000C-4BBB-A34E-1AA63D69925D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7414D32-88A1-416E-A717-3F47B6D1BE74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"370DC543-AC01-4B91-88C7-60C323E35929\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D1CD80F-E898-41CE-8A86-28C2F48B928A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF610051-1638-4C1B-9864-11E34EFC4DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78260223-50C0-48F8-9A65-AE67489E602C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18E39462-4CEE-4C29-8B60-50E05FCF3E91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC7454AF-7610-4CD3-BD2B-95A6C3283811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB633E6C-025C-4B31-ABE7-8318C813376B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"883FA166-2973-42BA-842D-28FBDBFEAC4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4362045B-7065-4FF9-A977-B3DA7894F831\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC27E79D-6B4B-4839-9664-DFE821C45C2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4963A243-74FA-43AD-9645-C9FAD527A6E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31C6EACA-35BE-4032-93DA-5F738AEE0F4A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados.\"}]",
"id": "CVE-2009-0626",
"lastModified": "2024-11-21T01:00:33.130",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-03-27T16:30:01.953",
"references": "[{\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0626\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2009-03-27T16:30:01.953\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0668C45B-9D25-424B-B876-C1721BFFE5DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292F6F99-19B3-4106-A432-5DE916CCDD56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40183EF8-BD19-49AD-9E55-7FCCA635327F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E40D5D-F46E-4098-A46A-1A52A343310D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D73E5138-016A-48EC-A367-3D3285AAFED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C114F1A6-5DFE-408F-B83A-E8B9D4AF9791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD5C082-9730-466D-A4A8-E4EEE5F3730D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF419BD-8474-4F33-9CDD-587E341ABA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332B0446-4D8B-414B-B572-84B45D5643AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40FB896-E20C-46B1-BF59-FBB42295F9C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C3B413-76F7-413B-A51F-29834F9DE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B418CFDD-AF36-46F9-B347-B34E72100F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F12741-69FB-46DD-A670-8461492B338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC2D158-6174-4AE8-83DA-125B072B6980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FC4904-1F4D-4E10-AF95-911B07827598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B9E611-3F06-424C-96EF-EE4997C70AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FE195E-084B-4F4C-800D-850165DED48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74F350-37F8-48DF-924E-415E51932163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E618BF54-56DC-40FC-A515-3BFB4366F823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1976E53-85A6-494F-B8AC-847E7988850C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A668D08-14C4-4438-A59C-CE60498BEF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520304A4-EB15-42A8-A402-8251A4D2076D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139B1182-61A3-4F3D-9E29-758F27917646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC3706F-B00A-405E-917E-7FD5217E0501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1938D118-C07F-4BEC-8030-947F099BFCB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB2B390-A39F-4082-BBCB-712BDD95886D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F782741-0F18-4FBC-9D00-AAABB8BC6A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB11851-BCF8-485B-91F9-6A39B2354826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DFE3FC0-79BC-4549-98BA-235A53719F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4691CEAD-47F1-4A97-84A4-72B794D3F714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A28452-000C-4BBB-A34E-1AA63D69925D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DC543-AC01-4B91-88C7-60C323E35929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1CD80F-E898-41CE-8A86-28C2F48B928A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF610051-1638-4C1B-9864-11E34EFC4DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78260223-50C0-48F8-9A65-AE67489E602C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E39462-4CEE-4C29-8B60-50E05FCF3E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7454AF-7610-4CD3-BD2B-95A6C3283811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB633E6C-025C-4B31-ABE7-8318C813376B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883FA166-2973-42BA-842D-28FBDBFEAC4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4362045B-7065-4FF9-A977-B3DA7894F831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC27E79D-6B4B-4839-9664-DFE821C45C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4963A243-74FA-43AD-9645-C9FAD527A6E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C6EACA-35BE-4032-93DA-5F738AEE0F4A\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…