cve-2009-0628
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
Summary
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
References
ykramarz@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
ykramarz@cisco.comhttp://securitytracker.com/id?1021896
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securityfocus.com/bid/34239
ykramarz@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
ykramarz@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49427
ykramarz@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021896
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34239
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49427
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "oval:org.mitre.oval:def:12092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
          },
          {
            "name": "34239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34239"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "1021896",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021896"
          },
          {
            "name": "ios-sslvpn-tcbleak-dos(49427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
          },
          {
            "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "oval:org.mitre.oval:def:12092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
        },
        {
          "name": "34239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34239"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "1021896",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021896"
        },
        {
          "name": "ios-sslvpn-tcbleak-dos(49427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
        },
        {
          "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "oval:org.mitre.oval:def:12092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"
            },
            {
              "name": "34239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34239"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "1021896",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021896"
            },
            {
              "name": "ios-sslvpn-tcbleak-dos(49427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"
            },
            {
              "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0628",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"95418AD2-FB85-4E20-B874-D82DDF88BC91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8FC7948-B922-486E-9E5F-069B930EB1E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*\", \"matchCriteriaId\": \"475EABCF-7404-4B65-9B29-E35C7D673B47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D99C07D-4EE3-4057-8E76-3468C45B4A4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\", \"matchCriteriaId\": \"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*\", \"matchCriteriaId\": \"372582DB-DAB8-4B57-A778-5E2BC35B8233\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\", \"matchCriteriaId\": \"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*\", \"matchCriteriaId\": \"36CF94C8-D6FE-4229-86F4-AF503F950151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\", \"matchCriteriaId\": \"554C9611-55F1-40AF-9862-7E902D5CE1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\", \"matchCriteriaId\": \"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*\", \"matchCriteriaId\": \"A19FD313-0AF6-43E1-9FCB-5D27A18C8C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBC11203-84FD-4F6C-8597-573FD784C68E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*\", \"matchCriteriaId\": \"39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A124BB0-EFC3-430E-89F9-FF49B4BF9A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0515E7C-E3A5-44F4-866F-283E43AE8654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A74B4D0-939B-4FF1-9163-86FF64DB368E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\", \"matchCriteriaId\": \"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*\", \"matchCriteriaId\": \"463C3A96-F8B7-4117-8CB3-D15B44119AB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\", \"matchCriteriaId\": \"01393D91-ED1D-460D-8621-10260F0CBDD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*\", \"matchCriteriaId\": \"48ABA40D-DE49-4B20-AFA1-302EB93719FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B0B18B6-FF50-48BE-8250-14E57FB73AE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED386B6-3C75-41C3-8206-9CBA14E20B00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*\", \"matchCriteriaId\": \"989581B0-FC28-457B-BDD2-72ED65BBE51E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF8A8C95-2DC3-47AB-BED3-7D33902440C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8920235-87C6-41D6-9497-CC12D18A6536\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752CFFC-F1DA-4122-ACD8-79CB963F485F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*\", \"matchCriteriaId\": \"7012F8E0-2256-448A-9C4D-E2DB5AB9852B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B44691F-A47B-4953-BAC9-B2D43F4BCC06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*\", \"matchCriteriaId\": \"8910F02B-DF61-443B-A4B5-2C0C04484519\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\", \"matchCriteriaId\": \"929836AD-8128-4174-872D-B9638B54611C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*\", \"matchCriteriaId\": \"045B4782-6CE2-40DD-A9F0-16E0C25768FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*\", \"matchCriteriaId\": \"9009E0C3-8BBC-4928-8528-62DA1ADC8BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FE4985F-2C87-4532-9D11-9BA37B7D6A9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A80C51F-C69A-4780-8AE9-BEBC8EBFA115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*\", \"matchCriteriaId\": \"416B8D2F-0B11-4074-B6BD-2E97F79B5520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ED5B53D-930D-477E-A0F6-76167AE67641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*\", \"matchCriteriaId\": \"29B39978-3BD0-40A8-93AE-EF40042EB7CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\", \"matchCriteriaId\": \"84983F6A-64F6-4720-9291-FC84CA10EE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2784C6-588A-4CAC-9362-515FB070D21E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A60117-E4D1-4741-98A2-E643A26616A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*\", \"matchCriteriaId\": \"93580300-6B1F-4D21-A51E-B781E234217D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E2C53A-51B0-4BD6-869E-1554B0BD3A4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB3BA487-727D-416C-80C6-C2F90D52E149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*\", \"matchCriteriaId\": \"A73738DE-E81B-4226-ABA3-B54A5AD96389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2DA9F41-FBD0-404A-8C6B-E827C3FACE81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2376E9-D7F4-4483-AB13-8840EA9A63E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*\", \"matchCriteriaId\": \"473A31DD-A0DC-4716-B98E-D2926A26DAF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9569DC5-9803-4B17-9FF1-5BDA8194FE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\", \"matchCriteriaId\": \"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9E90E83-1732-4BEF-BC5B-401769DC8880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C9DDEB-EDE8-4B0D-A347-32621CCEDE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\", \"matchCriteriaId\": \"51679B26-DF28-4E41-9801-E1599F250FFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\", \"matchCriteriaId\": \"E989900F-BE66-47E4-9A1B-11B9785F89BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\", \"matchCriteriaId\": \"95A01B7E-8231-4001-A340-31CE66474FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7368529-518E-4DB2-B291-1F0009445D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC62D3B-A287-4DED-A44D-3351452D4A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA2F5D70-6790-4756-9A6A-F1865DCD4D10\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.\"}, {\"lang\": \"es\", \"value\": \"Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (consumo de memoria y ca\\u00edda del dispositivo) mediante la conexi\\u00f3n de una sesi\\u00f3n SSL de forma anormal, precedida de una p\\u00e9rdida de bloque de control de transmisi\\u00f3n (TCB).\"}]",
      "id": "CVE-2009-0628",
      "lastModified": "2024-11-21T01:00:33.397",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 8.5, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2009-03-27T16:30:01.967",
      "references": "[{\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49427\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49427\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-0628\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2009-03-27T16:30:01.967\",\"lastModified\":\"2024-11-21T01:00:33.397\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.\"},{\"lang\":\"es\",\"value\":\"Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"95418AD2-FB85-4E20-B874-D82DDF88BC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8FC7948-B922-486E-9E5F-069B930EB1E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*\",\"matchCriteriaId\":\"475EABCF-7404-4B65-9B29-E35C7D673B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D99C07D-4EE3-4057-8E76-3468C45B4A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*\",\"matchCriteriaId\":\"372582DB-DAB8-4B57-A778-5E2BC35B8233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\",\"matchCriteriaId\":\"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*\",\"matchCriteriaId\":\"36CF94C8-D6FE-4229-86F4-AF503F950151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\",\"matchCriteriaId\":\"554C9611-55F1-40AF-9862-7E902D5CE1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19FD313-0AF6-43E1-9FCB-5D27A18C8C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC11203-84FD-4F6C-8597-573FD784C68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A124BB0-EFC3-430E-89F9-FF49B4BF9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0515E7C-E3A5-44F4-866F-283E43AE8654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A74B4D0-939B-4FF1-9163-86FF64DB368E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*\",\"matchCriteriaId\":\"463C3A96-F8B7-4117-8CB3-D15B44119AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\",\"matchCriteriaId\":\"01393D91-ED1D-460D-8621-10260F0CBDD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"48ABA40D-DE49-4B20-AFA1-302EB93719FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0B18B6-FF50-48BE-8250-14E57FB73AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED386B6-3C75-41C3-8206-9CBA14E20B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*\",\"matchCriteriaId\":\"989581B0-FC28-457B-BDD2-72ED65BBE51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF8A8C95-2DC3-47AB-BED3-7D33902440C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8920235-87C6-41D6-9497-CC12D18A6536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752CFFC-F1DA-4122-ACD8-79CB963F485F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*\",\"matchCriteriaId\":\"7012F8E0-2256-448A-9C4D-E2DB5AB9852B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44691F-A47B-4953-BAC9-B2D43F4BCC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*\",\"matchCriteriaId\":\"8910F02B-DF61-443B-A4B5-2C0C04484519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\",\"matchCriteriaId\":\"929836AD-8128-4174-872D-B9638B54611C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*\",\"matchCriteriaId\":\"045B4782-6CE2-40DD-A9F0-16E0C25768FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*\",\"matchCriteriaId\":\"9009E0C3-8BBC-4928-8528-62DA1ADC8BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE4985F-2C87-4532-9D11-9BA37B7D6A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A80C51F-C69A-4780-8AE9-BEBC8EBFA115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*\",\"matchCriteriaId\":\"416B8D2F-0B11-4074-B6BD-2E97F79B5520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED5B53D-930D-477E-A0F6-76167AE67641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*\",\"matchCriteriaId\":\"29B39978-3BD0-40A8-93AE-EF40042EB7CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\",\"matchCriteriaId\":\"84983F6A-64F6-4720-9291-FC84CA10EE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2784C6-588A-4CAC-9362-515FB070D21E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A60117-E4D1-4741-98A2-E643A26616A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"93580300-6B1F-4D21-A51E-B781E234217D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E2C53A-51B0-4BD6-869E-1554B0BD3A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3BA487-727D-416C-80C6-C2F90D52E149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73738DE-E81B-4226-ABA3-B54A5AD96389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DA9F41-FBD0-404A-8C6B-E827C3FACE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2376E9-D7F4-4483-AB13-8840EA9A63E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*\",\"matchCriteriaId\":\"473A31DD-A0DC-4716-B98E-D2926A26DAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9569DC5-9803-4B17-9FF1-5BDA8194FE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E90E83-1732-4BEF-BC5B-401769DC8880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C9DDEB-EDE8-4B0D-A347-32621CCEDE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"51679B26-DF28-4E41-9801-E1599F250FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"E989900F-BE66-47E4-9A1B-11B9785F89BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A01B7E-8231-4001-A340-31CE66474FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7368529-518E-4DB2-B291-1F0009445D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC62D3B-A287-4DED-A44D-3351452D4A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2F5D70-6790-4756-9A6A-F1865DCD4D10\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49427\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49427\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.