VAR-200210-0188

Vulnerability from variot - Updated: 2023-12-18 13:54

Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. When the CBOS TCP/IP stack is forced to process a high number of unusually large packets, it will consume all memory. This will cause the router to freeze and stop forwarding packets. CBOS (Cisco Broadband Operating System) is the operating system for Cisco 600 series routers. It is possible for a remote user to cause a denial of service of a CPE running CBOS software 2.4.4 and prior. Sending an unusually large packet to the telnet port will exploit this issue. The following devices in the Cisco 600 series of routers are affected by this issue: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678. This vulnerability has been assigned Cisco Bug ID CSCdv50135. CBOS does not correctly process the information packets submitted to the DHCP server, which can lead to denial of service attacks by remote attackers. The vulnerability number is: CSCdw90020

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200210-0188",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.4.4"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.4.3"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.4.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.3.9"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.3.8"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "cisco",
        "version": "2.3.7.002"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.3.7"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.3.5.015"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.3.5"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.3.2"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.0.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.4.2ap"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.3_.053"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.4.2b"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.0a"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2.1a"
      },
      {
        "model": "cbos b",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "cbos ap",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.3.053"
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "cbos",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "2.4.5"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.7.002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.1.0a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.5.015:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2ap:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.2.1a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3_.053:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.3.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:cbos:2.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery of this issue is credited to Knud Erik H\u00f8jgaard from Cybercity,\nDenmark.",
    "sources": [
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-0886",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-5277",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2002-0886",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200210-028",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5277",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory. \nWhen the CBOS TCP/IP stack is forced to process a high number of unusually large packets, it will consume all memory.  This will cause the router to freeze and stop forwarding packets. CBOS (Cisco Broadband Operating System) is the operating system for Cisco\n600 series routers. \nIt is possible for a remote user to cause a denial of service of a CPE running CBOS software 2.4.4 and prior. \nSending an unusually large packet to the telnet port will exploit this issue. \nThe following devices in the Cisco 600 series of routers are affected by this issue:\n605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678. \nThis vulnerability has been assigned Cisco Bug ID CSCdv50135. CBOS does not correctly process the information packets submitted to the DHCP server, which can lead to denial of service attacks by remote attackers. The vulnerability number is: CSCdw90020",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-5277",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4813",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "4814",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "4815",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "9151",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "9152",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "9153",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20020523 CBOS - IMPROVING RESILIENCE TO DENIAL-OF-SERVICE ATTACKS",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-75298",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "21472",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-5277",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "id": "VAR-200210-0188",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:54:24.894000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/4813"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/4814"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/4815"
      },
      {
        "trust": 1.7,
        "url": "http://www.cisco.com/warp/public/707/cbos-dos.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/9151.php"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/9153.php"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9152"
      },
      {
        "trust": 0.9,
        "url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/9152"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-10-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "BID",
        "id": "4815"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "BID",
        "id": "4814"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "BID",
        "id": "4813"
      },
      {
        "date": "2002-10-04T04:00:00",
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5277"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "BID",
        "id": "4815"
      },
      {
        "date": "2002-05-23T00:00:00",
        "db": "BID",
        "id": "4814"
      },
      {
        "date": "2009-07-11T12:46:00",
        "db": "BID",
        "id": "4813"
      },
      {
        "date": "2017-07-11T01:29:12.900000",
        "db": "NVD",
        "id": "CVE-2002-0886"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco CBOS Oversized packet leads DHCP Denial of service attack vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200210-028"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Failure to Handle Exceptional Conditions",
    "sources": [
      {
        "db": "BID",
        "id": "4815"
      },
      {
        "db": "BID",
        "id": "4814"
      },
      {
        "db": "BID",
        "id": "4813"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…