cve-2011-3302
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76089", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "76089", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76089", "refsource": "OSVDB", "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3302", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15ECB359-7290-4732-96F2-AFCEE21C7899\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88102B08-48E8-48FD-81E9-FAF717D6BE34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DA2F01C-ECF1-477B-A413-75D0EB817079\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC150564-7413-401A-9DD8-8AD773F1D8F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0714F9E-75AD-4405-BBC3-E0D817C05EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9649696-DE81-48C7-A276-17E1ECADAD5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F4EA382-848E-4FE8-AE03-5DDDDBE88C87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"538B700C-AA95-4D63-8148-E4D5ED08CE02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61DD640A-120F-487D-B364-66B69C962A35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E84099EB-2535-4A9F-8355-FF937CFBD122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C599F894-DAD2-4231-8BB8-1427E7C02D60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49696766-ECCE-4903-AA54-271EFEA58B8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F60C12-71C9-47C6-B43F-A0374419D736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C853CD9-F451-406E-A515-3BDC34E55639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD7C28DC-B15F-486B-96F1-D08529B7374A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B03A1408-A55A-4482-B239-B13094B13BFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"62DC7025-F067-45CB-BEA6-ED16A5BD2896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C926091-D9A6-4264-8E9A-52AFCBC09D34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE82E4AC-BE77-4A45-839F-45163D64A4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1.22\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B521F270-2D51-48BE-BC29-0EDED33FA30B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39BA51CC-2ADA-4527-8D47-D821BBFA5EFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C73F417-0CF4-4E78-9B33-939F0E41994E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BABA2F-EE28-4914-8130-6768EC599B65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.15\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C912270C-6ABB-4149-8E67-96028B45C312\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB2631B6-F238-4FE3-AA34-703FFB6D6803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F1C112-F1C1-4703-8EE0-2FC9F8B233CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.18\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D55D3385-FEE7-44AA-A65A-50924FDC1BFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.19\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC223DE2-90CA-43CD-8EBF-C9C351D10187\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.48\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F0864E8-E9C5-498D-84F4-4DE02FF4852A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95627941-30D8-452F-B6C8-76D2BEE93514\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"364CA0EA-F85E-4C4B-96D8-A7256F413844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DA3389C-86FE-45F7-97D7-E3386403944F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"788C1177-EA1F-4C89-B4D2-C3939C45472C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31E7CB8A-17DF-43EB-9BCB-F2E5293C949F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B97D0B-974E-48E7-A5F1-AB572ACB7829\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C68E73D6-A207-4276-A972-52B859CD958A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E406214-2776-42C2-B777-92E6420FBFBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2185ED62-166C-4F43-ACA2-C1EF43C48D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F24697-0124-4326-8499-29931D57D246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7236893-3EE9-4DBE-8A75-5294FD82E922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22E1D918-A52E-4892-9D0D-EE3E21853BD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA8018B5-4392-4D14-A017-80D325FBCB2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465313C5-BFB9-458A-8150-8F7BA1F8C386\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C808D46-C846-4C53-A713-150C3FED3FAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31BA0ED9-6962-4E19-89A1-1724AADEC669\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69683734-528F-488A-8A90-8478FA27B97E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"310B4795-4BC3-4F47-8F54-C513ECC2C9F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E87F3D-669C-4451-A4C4-E8FE04769248\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CB79D96-75EA-4B4F-99A7-9AB4158B7301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCBA3A3-7C8F-481A-9BEC-78981547F8BE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1D05BC0-BC8F-4598-B472-77FF7EE0AA09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BCF8541-6C88-49AC-B065-9CCA0279025B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FCC3678-E130-42AD-B57F-0E63AB380693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DCA1C19-C59E-46EB-AD87-F706E324ECBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"543C12E0-4DB3-43FD-B415-1DEDA9121FE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6A10634-93CE-4E13-A6BB-E21C7CB204A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3414D192-8805-43A1-AFFE-0BB724208D60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89D6D3CC-2D73-4D42-B398-C0980FE7C10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(12\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DF6C8DB-C803-4E83-B90F-597535CF0BA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(13\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF7AEE4A-E540-4B93-A019-E6EC750EF960\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(15\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CAB1F17-DEED-4620-9DD2-A40AA526300F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768152F0-D84B-4853-9AA0-E7040A42DBB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E686BC6F-665C-47DF-889F-5A5D4243A8BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(18\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6086BF6-5D33-4EDB-9F8F-D80E2A23713A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(19\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBBA6A0-A0A3-4E25-877A-3018AE002E7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(20\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915C9825-863A-4673-AF9A-52BEBD770176\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF62AD07-006D-4AD6-A8E9-68EB3D930700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F425EA4-40A6-4FD7-B2C4-150A4517AD55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7304563-4DC9-4A0E-9AB5-DC852F58FAA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"774D4F68-8331-4160-8DEB-6606D1739BCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21E72AE6-BB0C-44E8-AA28-CE19C5551725\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A71325A3-E02C-47EC-A9F3-86998B4C54CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BE5DE70-5D5A-4221-8E17-CABBDD990283\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7FB9669-5D07-48CC-AB64-C82E058A2AA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8BF33E0-6C8C-4921-A5E3-0AFD92130180\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00F3EBCC-F77B-49FE-9894-BD03936935CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2017BA46-5824-4B39-B547-CBD80B245A52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D43ED9B-2910-4391-9370-ED622648DB68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(12\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD4127BD-DC08-4352-810B-752C849AA49C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(13\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2009145-F6C0-4275-A56E-E31006709A6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(15\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"481B5609-CA88-4E8A-AC84-17CCA2D81D34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F11F12F-96AC-4A1D-B995-B0E020F2574C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C32B7601-AA90-421B-80F4-CC11CE390563\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(18\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"789FE084-1D9B-4779-AF61-0FDE97D2DC0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(19\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E93E5289-2866-4251-859C-A33B877E8EE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(20\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"965D54CB-A558-4140-83D6-3BAD9A38FE2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(21\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97840537-1FAA-4124-A689-CC437061F549\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA0A0377-13AC-4834-A266-AFCAC9FE2938\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"404B0B52-90EA-4E5D-B43C-1FE8144EAFDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C62050-0BD8-45B5-B7E6-CEF4426EEF43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D30BED1-091A-46FB-A274-1778F1025849\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37188FD-7BAE-447A-83A4-C644AE2B4B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF89057D-7C5F-428D-A15D-F386F61590D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DEFB820-3031-4B4B-AE02-FCF2527B3BF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB820815-EF7F-44F8-9330-CD879197D0A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AE71162-46E5-455D-BA7D-C4E2DFE8F199\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(12\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84DC9BC4-0803-4572-ACB9-136353618996\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(13\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"279A740A-F87F-43F3-851F-BCFC09E37A1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(15\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14E40E7E-892D-4975-86BD-31D28A635D30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCC030F-526B-4900-AD5A-9E1591FF767C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99B72A5F-9251-476C-9071-19C06490A363\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E1B7437-8A7A-484E-983B-32E878BF091F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DFE660-9C82-43BE-84B6-C584EF6D85A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9F9EA36-2A8C-4C15-B0A9-E0E410610F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F924BC2C-36E8-452B-8AAE-CF74E5194D0E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99DE48DF-A309-4A1C-B977-AE81B4EDB589\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8D63186-5834-448C-98F2-0C189A11D25D\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.\"}, {\"lang\": \"es\", \"value\": \"Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 y v8.2 anteriores a v8.2(5.11), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.6), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos causar una denegaci\\u00f3n de servicio (reinicio del dispositivo) a trav\\u00e9s del tr\\u00e1fico SunRPC manipulado, tambi\\u00e9n conocido como Bug IDs CSCto92398 y CSCtq09989.\"}]", "id": "CVE-2011-3302", "lastModified": "2024-11-21T01:30:13.830", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-10-06T10:55:05.550", "references": "[{\"url\": \"http://osvdb.org/76089\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/70333\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://osvdb.org/76089\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/70333\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-3302\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2011-10-06T10:55:05.550\",\"lastModified\":\"2024-11-21T01:30:13.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.\"},{\"lang\":\"es\",\"value\":\"Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 y v8.2 anteriores a v8.2(5.11), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.6), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s del tr\u00e1fico SunRPC manipulado, tambi\u00e9n conocido como Bug IDs CSCto92398 y CSCtq09989.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15ECB359-7290-4732-96F2-AFCEE21C7899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88102B08-48E8-48FD-81E9-FAF717D6BE34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2F01C-ECF1-477B-A413-75D0EB817079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC150564-7413-401A-9DD8-8AD773F1D8F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0714F9E-75AD-4405-BBC3-E0D817C05EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9649696-DE81-48C7-A276-17E1ECADAD5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4EA382-848E-4FE8-AE03-5DDDDBE88C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538B700C-AA95-4D63-8148-E4D5ED08CE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DD640A-120F-487D-B364-66B69C962A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84099EB-2535-4A9F-8355-FF937CFBD122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C599F894-DAD2-4231-8BB8-1427E7C02D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49696766-ECCE-4903-AA54-271EFEA58B8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F60C12-71C9-47C6-B43F-A0374419D736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C853CD9-F451-406E-A515-3BDC34E55639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C28DC-B15F-486B-96F1-D08529B7374A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03A1408-A55A-4482-B239-B13094B13BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"62DC7025-F067-45CB-BEA6-ED16A5BD2896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C926091-D9A6-4264-8E9A-52AFCBC09D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE82E4AC-BE77-4A45-839F-45163D64A4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1.22\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B521F270-2D51-48BE-BC29-0EDED33FA30B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39BA51CC-2ADA-4527-8D47-D821BBFA5EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C73F417-0CF4-4E78-9B33-939F0E41994E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BABA2F-EE28-4914-8130-6768EC599B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912270C-6ABB-4149-8E67-96028B45C312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2631B6-F238-4FE3-AA34-703FFB6D6803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F1C112-F1C1-4703-8EE0-2FC9F8B233CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55D3385-FEE7-44AA-A65A-50924FDC1BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC223DE2-90CA-43CD-8EBF-C9C351D10187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.48\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F0864E8-E9C5-498D-84F4-4DE02FF4852A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95627941-30D8-452F-B6C8-76D2BEE93514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364CA0EA-F85E-4C4B-96D8-A7256F413844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA3389C-86FE-45F7-97D7-E3386403944F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"788C1177-EA1F-4C89-B4D2-C3939C45472C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E7CB8A-17DF-43EB-9BCB-F2E5293C949F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B97D0B-974E-48E7-A5F1-AB572ACB7829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68E73D6-A207-4276-A972-52B859CD958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E406214-2776-42C2-B777-92E6420FBFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2185ED62-166C-4F43-ACA2-C1EF43C48D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F24697-0124-4326-8499-29931D57D246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7236893-3EE9-4DBE-8A75-5294FD82E922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E1D918-A52E-4892-9D0D-EE3E21853BD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA8018B5-4392-4D14-A017-80D325FBCB2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C808D46-C846-4C53-A713-150C3FED3FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BA0ED9-6962-4E19-89A1-1724AADEC669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69683734-528F-488A-8A90-8478FA27B97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310B4795-4BC3-4F47-8F54-C513ECC2C9F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E87F3D-669C-4451-A4C4-E8FE04769248\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB79D96-75EA-4B4F-99A7-9AB4158B7301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCBA3A3-7C8F-481A-9BEC-78981547F8BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D05BC0-BC8F-4598-B472-77FF7EE0AA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCF8541-6C88-49AC-B065-9CCA0279025B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FCC3678-E130-42AD-B57F-0E63AB380693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DCA1C19-C59E-46EB-AD87-F706E324ECBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543C12E0-4DB3-43FD-B415-1DEDA9121FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A10634-93CE-4E13-A6BB-E21C7CB204A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3414D192-8805-43A1-AFFE-0BB724208D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89D6D3CC-2D73-4D42-B398-C0980FE7C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF6C8DB-C803-4E83-B90F-597535CF0BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7AEE4A-E540-4B93-A019-E6EC750EF960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAB1F17-DEED-4620-9DD2-A40AA526300F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768152F0-D84B-4853-9AA0-E7040A42DBB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E686BC6F-665C-47DF-889F-5A5D4243A8BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6086BF6-5D33-4EDB-9F8F-D80E2A23713A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBBA6A0-A0A3-4E25-877A-3018AE002E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915C9825-863A-4673-AF9A-52BEBD770176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF62AD07-006D-4AD6-A8E9-68EB3D930700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F425EA4-40A6-4FD7-B2C4-150A4517AD55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7304563-4DC9-4A0E-9AB5-DC852F58FAA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"774D4F68-8331-4160-8DEB-6606D1739BCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21E72AE6-BB0C-44E8-AA28-CE19C5551725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71325A3-E02C-47EC-A9F3-86998B4C54CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE5DE70-5D5A-4221-8E17-CABBDD990283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7FB9669-5D07-48CC-AB64-C82E058A2AA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8BF33E0-6C8C-4921-A5E3-0AFD92130180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00F3EBCC-F77B-49FE-9894-BD03936935CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2017BA46-5824-4B39-B547-CBD80B245A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D43ED9B-2910-4391-9370-ED622648DB68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD4127BD-DC08-4352-810B-752C849AA49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2009145-F6C0-4275-A56E-E31006709A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"481B5609-CA88-4E8A-AC84-17CCA2D81D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F11F12F-96AC-4A1D-B995-B0E020F2574C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C32B7601-AA90-421B-80F4-CC11CE390563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"789FE084-1D9B-4779-AF61-0FDE97D2DC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93E5289-2866-4251-859C-A33B877E8EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965D54CB-A558-4140-83D6-3BAD9A38FE2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\\\(21\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97840537-1FAA-4124-A689-CC437061F549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0A0377-13AC-4834-A266-AFCAC9FE2938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404B0B52-90EA-4E5D-B43C-1FE8144EAFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C62050-0BD8-45B5-B7E6-CEF4426EEF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D30BED1-091A-46FB-A274-1778F1025849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37188FD-7BAE-447A-83A4-C644AE2B4B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF89057D-7C5F-428D-A15D-F386F61590D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DEFB820-3031-4B4B-AE02-FCF2527B3BF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB820815-EF7F-44F8-9330-CD879197D0A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE71162-46E5-455D-BA7D-C4E2DFE8F199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DC9BC4-0803-4572-ACB9-136353618996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"279A740A-F87F-43F3-851F-BCFC09E37A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\\\(15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E40E7E-892D-4975-86BD-31D28A635D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCC030F-526B-4900-AD5A-9E1591FF767C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B72A5F-9251-476C-9071-19C06490A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1B7437-8A7A-484E-983B-32E878BF091F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DFE660-9C82-43BE-84B6-C584EF6D85A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F9EA36-2A8C-4C15-B0A9-E0E410610F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F924BC2C-36E8-452B-8AAE-CF74E5194D0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99DE48DF-A309-4A1C-B977-AE81B4EDB589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D63186-5834-448C-98F2-0C189A11D25D\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/76089\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/70333\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://osvdb.org/76089\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/70333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.