cve-2009-0634
Vulnerability from cvelistv5
Published
2009-03-27 16:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:12043", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "oval:org.mitre.oval:def:12043", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0851" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-0634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:12043", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" }, { "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" }, { "name": "34438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34438" }, { "name": "34241", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34241" }, { "name": "1021898", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021898" }, { "name": "20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" }, { "name": "ios-mobile-ha-dos(49585)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" }, { "name": "ios-mobile-dos(49424)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" }, { "name": "ADV-2009-0851", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0851" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-0634", "datePublished": "2009-03-27T16:00:00", "dateReserved": "2009-02-18T00:00:00", "dateUpdated": "2024-08-07T04:40:05.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"95418AD2-FB85-4E20-B874-D82DDF88BC91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8FC7948-B922-486E-9E5F-069B930EB1E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*\", \"matchCriteriaId\": \"475EABCF-7404-4B65-9B29-E35C7D673B47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D99C07D-4EE3-4057-8E76-3468C45B4A4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\", \"matchCriteriaId\": \"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*\", \"matchCriteriaId\": \"372582DB-DAB8-4B57-A778-5E2BC35B8233\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\", \"matchCriteriaId\": \"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*\", \"matchCriteriaId\": \"36CF94C8-D6FE-4229-86F4-AF503F950151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\", \"matchCriteriaId\": \"554C9611-55F1-40AF-9862-7E902D5CE1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\", \"matchCriteriaId\": \"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*\", \"matchCriteriaId\": \"A19FD313-0AF6-43E1-9FCB-5D27A18C8C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBC11203-84FD-4F6C-8597-573FD784C68E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*\", \"matchCriteriaId\": \"39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A124BB0-EFC3-430E-89F9-FF49B4BF9A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0515E7C-E3A5-44F4-866F-283E43AE8654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A74B4D0-939B-4FF1-9163-86FF64DB368E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\", \"matchCriteriaId\": \"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*\", \"matchCriteriaId\": \"463C3A96-F8B7-4117-8CB3-D15B44119AB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\", \"matchCriteriaId\": \"01393D91-ED1D-460D-8621-10260F0CBDD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*\", \"matchCriteriaId\": \"48ABA40D-DE49-4B20-AFA1-302EB93719FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B0B18B6-FF50-48BE-8250-14E57FB73AE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED386B6-3C75-41C3-8206-9CBA14E20B00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*\", \"matchCriteriaId\": \"989581B0-FC28-457B-BDD2-72ED65BBE51E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF8A8C95-2DC3-47AB-BED3-7D33902440C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8920235-87C6-41D6-9497-CC12D18A6536\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752CFFC-F1DA-4122-ACD8-79CB963F485F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*\", \"matchCriteriaId\": \"7012F8E0-2256-448A-9C4D-E2DB5AB9852B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B44691F-A47B-4953-BAC9-B2D43F4BCC06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*\", \"matchCriteriaId\": \"8910F02B-DF61-443B-A4B5-2C0C04484519\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\", \"matchCriteriaId\": \"929836AD-8128-4174-872D-B9638B54611C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*\", \"matchCriteriaId\": \"045B4782-6CE2-40DD-A9F0-16E0C25768FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*\", \"matchCriteriaId\": \"9009E0C3-8BBC-4928-8528-62DA1ADC8BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FE4985F-2C87-4532-9D11-9BA37B7D6A9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A80C51F-C69A-4780-8AE9-BEBC8EBFA115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*\", \"matchCriteriaId\": \"416B8D2F-0B11-4074-B6BD-2E97F79B5520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ED5B53D-930D-477E-A0F6-76167AE67641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*\", \"matchCriteriaId\": \"29B39978-3BD0-40A8-93AE-EF40042EB7CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\", \"matchCriteriaId\": \"84983F6A-64F6-4720-9291-FC84CA10EE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2784C6-588A-4CAC-9362-515FB070D21E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A60117-E4D1-4741-98A2-E643A26616A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*\", \"matchCriteriaId\": \"93580300-6B1F-4D21-A51E-B781E234217D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E2C53A-51B0-4BD6-869E-1554B0BD3A4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB3BA487-727D-416C-80C6-C2F90D52E149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*\", \"matchCriteriaId\": \"A73738DE-E81B-4226-ABA3-B54A5AD96389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2DA9F41-FBD0-404A-8C6B-E827C3FACE81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2376E9-D7F4-4483-AB13-8840EA9A63E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*\", \"matchCriteriaId\": \"473A31DD-A0DC-4716-B98E-D2926A26DAF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9569DC5-9803-4B17-9FF1-5BDA8194FE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\", \"matchCriteriaId\": \"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9E90E83-1732-4BEF-BC5B-401769DC8880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C9DDEB-EDE8-4B0D-A347-32621CCEDE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\", \"matchCriteriaId\": \"51679B26-DF28-4E41-9801-E1599F250FFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\", \"matchCriteriaId\": \"E989900F-BE66-47E4-9A1B-11B9785F89BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\", \"matchCriteriaId\": \"95A01B7E-8231-4001-A340-31CE66474FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7368529-518E-4DB2-B291-1F0009445D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC62D3B-A287-4DED-A44D-3351452D4A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA2F5D70-6790-4756-9A6A-F1865DCD4D10\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades no especificadas en la implementaci\\u00f3n del agente \\\"home\\\" (HA) en (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (presi\\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337.\"}]", "id": "CVE-2009-0634", "lastModified": "2024-11-21T01:00:34.270", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2009-03-27T16:30:02.063", "references": "[{\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021898\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34241\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49424\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49585\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021898\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34241\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49424\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49585\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-0634\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2009-03-27T16:30:02.063\",\"lastModified\":\"2024-11-21T01:00:34.270\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \\\"home\\\" (HA) en (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"95418AD2-FB85-4E20-B874-D82DDF88BC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8FC7948-B922-486E-9E5F-069B930EB1E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*\",\"matchCriteriaId\":\"475EABCF-7404-4B65-9B29-E35C7D673B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D99C07D-4EE3-4057-8E76-3468C45B4A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*\",\"matchCriteriaId\":\"372582DB-DAB8-4B57-A778-5E2BC35B8233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\",\"matchCriteriaId\":\"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*\",\"matchCriteriaId\":\"36CF94C8-D6FE-4229-86F4-AF503F950151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\",\"matchCriteriaId\":\"554C9611-55F1-40AF-9862-7E902D5CE1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19FD313-0AF6-43E1-9FCB-5D27A18C8C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC11203-84FD-4F6C-8597-573FD784C68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A124BB0-EFC3-430E-89F9-FF49B4BF9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0515E7C-E3A5-44F4-866F-283E43AE8654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A74B4D0-939B-4FF1-9163-86FF64DB368E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*\",\"matchCriteriaId\":\"463C3A96-F8B7-4117-8CB3-D15B44119AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\",\"matchCriteriaId\":\"01393D91-ED1D-460D-8621-10260F0CBDD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"48ABA40D-DE49-4B20-AFA1-302EB93719FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0B18B6-FF50-48BE-8250-14E57FB73AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED386B6-3C75-41C3-8206-9CBA14E20B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*\",\"matchCriteriaId\":\"989581B0-FC28-457B-BDD2-72ED65BBE51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF8A8C95-2DC3-47AB-BED3-7D33902440C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8920235-87C6-41D6-9497-CC12D18A6536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752CFFC-F1DA-4122-ACD8-79CB963F485F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*\",\"matchCriteriaId\":\"7012F8E0-2256-448A-9C4D-E2DB5AB9852B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44691F-A47B-4953-BAC9-B2D43F4BCC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*\",\"matchCriteriaId\":\"8910F02B-DF61-443B-A4B5-2C0C04484519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\",\"matchCriteriaId\":\"929836AD-8128-4174-872D-B9638B54611C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*\",\"matchCriteriaId\":\"045B4782-6CE2-40DD-A9F0-16E0C25768FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*\",\"matchCriteriaId\":\"9009E0C3-8BBC-4928-8528-62DA1ADC8BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE4985F-2C87-4532-9D11-9BA37B7D6A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A80C51F-C69A-4780-8AE9-BEBC8EBFA115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*\",\"matchCriteriaId\":\"416B8D2F-0B11-4074-B6BD-2E97F79B5520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED5B53D-930D-477E-A0F6-76167AE67641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*\",\"matchCriteriaId\":\"29B39978-3BD0-40A8-93AE-EF40042EB7CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\",\"matchCriteriaId\":\"84983F6A-64F6-4720-9291-FC84CA10EE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2784C6-588A-4CAC-9362-515FB070D21E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A60117-E4D1-4741-98A2-E643A26616A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"93580300-6B1F-4D21-A51E-B781E234217D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E2C53A-51B0-4BD6-869E-1554B0BD3A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3BA487-727D-416C-80C6-C2F90D52E149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73738DE-E81B-4226-ABA3-B54A5AD96389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DA9F41-FBD0-404A-8C6B-E827C3FACE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2376E9-D7F4-4483-AB13-8840EA9A63E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*\",\"matchCriteriaId\":\"473A31DD-A0DC-4716-B98E-D2926A26DAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9569DC5-9803-4B17-9FF1-5BDA8194FE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E90E83-1732-4BEF-BC5B-401769DC8880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C9DDEB-EDE8-4B0D-A347-32621CCEDE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"51679B26-DF28-4E41-9801-E1599F250FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"E989900F-BE66-47E4-9A1B-11B9785F89BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A01B7E-8231-4001-A340-31CE66474FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7368529-518E-4DB2-B291-1F0009445D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC62D3B-A287-4DED-A44D-3351452D4A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2F5D70-6790-4756-9A6A-F1865DCD4D10\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021898\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34241\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49424\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49585\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49585\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.