FKIE_CVE-2009-0626

Vulnerability from fkie_nvd - Published: 2009-03-27 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.
References
psirt@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
psirt@cisco.comhttp://securitytracker.com/id?1021896
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/34239
psirt@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49425
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021896
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34239
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49425
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919
Impacted products
Vendor Product Version
cisco ios 12.3
cisco ios 12.3b
cisco ios 12.3bc
cisco ios 12.3bw
cisco ios 12.3ja
cisco ios 12.3jea
cisco ios 12.3jeb
cisco ios 12.3jec
cisco ios 12.3jk
cisco ios 12.3jl
cisco ios 12.3jx
cisco ios 12.3t
cisco ios 12.3tpc
cisco ios 12.3va
cisco ios 12.3xa
cisco ios 12.3xb
cisco ios 12.3xc
cisco ios 12.3xd
cisco ios 12.3xf
cisco ios 12.3xg
cisco ios 12.3xi
cisco ios 12.3xj
cisco ios 12.3xk
cisco ios 12.3xl
cisco ios 12.3xq
cisco ios 12.3xs
cisco ios 12.3xu
cisco ios 12.3xw
cisco ios 12.3xx
cisco ios 12.3xy
cisco ios 12.3xz
cisco ios 12.3ya
cisco ios 12.3yd
cisco ios 12.3yf
cisco ios 12.3yg
cisco ios 12.3yh
cisco ios 12.3yi
cisco ios 12.3yj
cisco ios 12.3yk
cisco ios 12.3ym
cisco ios 12.3yq
cisco ios 12.3ys
cisco ios 12.3yt
cisco ios 12.3yu
cisco ios 12.3yx
cisco ios 12.3yz
cisco ios 12.4
cisco ios 12.4ja
cisco ios 12.4jda
cisco ios 12.4jk
cisco ios 12.4jl
cisco ios 12.4jma
cisco ios 12.4jmb
cisco ios 12.4jx
cisco ios 12.4md
cisco ios 12.4mr
cisco ios 12.4sw
cisco ios 12.4t
cisco ios 12.4xa
cisco ios 12.4xb
cisco ios 12.4xc
cisco ios 12.4xd
cisco ios 12.4xf
cisco ios 12.4xg
cisco ios 12.4xj
cisco ios 12.4xk
cisco ios 12.4xl
cisco ios 12.4xm
cisco ios 12.4xn
cisco ios 12.4xp
cisco ios 12.4xq
cisco ios 12.4xt
cisco ios 12.4xv
cisco ios 12.4xw
cisco ios 12.4xy
cisco ios 12.4xz
cisco ios 12.4ya

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
              "matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
              "matchCriteriaId": "40183EF8-BD19-49AD-9E55-7FCCA635327F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
              "matchCriteriaId": "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD5C082-9730-466D-A4A8-E4EEE5F3730D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF419BD-8474-4F33-9CDD-587E341ABA8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
              "matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
              "matchCriteriaId": "D40FB896-E20C-46B1-BF59-FBB42295F9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
              "matchCriteriaId": "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*",
              "matchCriteriaId": "B418CFDD-AF36-46F9-B347-B34E72100F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
              "matchCriteriaId": "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
              "matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
              "matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
              "matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
              "matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
              "matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
              "matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
              "matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
              "matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC3706F-B00A-405E-917E-7FD5217E0501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
              "matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
              "matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
              "matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
              "matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F782741-0F18-4FBC-9D00-AAABB8BC6A10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB11851-BCF8-485B-91F9-6A39B2354826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DFE3FC0-79BC-4549-98BA-235A53719F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
              "matchCriteriaId": "4691CEAD-47F1-4A97-84A4-72B794D3F714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A28452-000C-4BBB-A34E-1AA63D69925D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
              "matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
              "matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
              "matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1CD80F-E898-41CE-8A86-28C2F48B928A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
              "matchCriteriaId": "78260223-50C0-48F8-9A65-AE67489E602C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E39462-4CEE-4C29-8B60-50E05FCF3E91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC7454AF-7610-4CD3-BD2B-95A6C3283811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
              "matchCriteriaId": "883FA166-2973-42BA-842D-28FBDBFEAC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
              "matchCriteriaId": "4362045B-7065-4FF9-A977-B3DA7894F831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC27E79D-6B4B-4839-9664-DFE821C45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
              "matchCriteriaId": "4963A243-74FA-43AD-9645-C9FAD527A6E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
              "matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet."
    },
    {
      "lang": "es",
      "value": "La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados."
    }
  ],
  "id": "CVE-2009-0626",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:01.953",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021896"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…