var-200402-0049
Vulnerability from variot
Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. A number of vulnerabilities have been discovered in various implementations of the multimedia telephony protocols H.323 and H.225. Voice over Internet Protocol (VoIP) and video conferencing equpiment and software can use these protocols to interoperate over a variety of computer networks. The majority of the vulnerabilities discovered are limited to denial of service impacts; however, several may allow unauthorized code execution. Microsoft ISA Server Is operating in cache mode, Microsoft Firewall Service Is disabled by default and is not affected by this issue. In addition, H.323 Vulnerabilities related to this vulnerability have been confirmed in other systems that implement the protocol. For other system information, NISCC-006489 (JVN) , NISCC Advisory 006489/h323(CPNI Advisory 00387) Please check also. Caution: Of this vulnerability CVSS The basic value is " Microsoft ISA Server " Is calculated for. Other systems are not considered.According to the information provided by Microsoft, Microsoft ISA Server Is specific H.323 If traffic is handled, arbitrary code may be executed. Also, H.323 Service disruption for other systems that implement the protocol (DoS) An attacker may be attacked or a third party may be able to execute arbitrary code remotely. The condition presents itself due to insufficient boundary checks performed by the Microsoft Firewall Service on specially crafted H.323 traffic. This may lead to complete control of the vulnerable system. -----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2004-01 Multiple H.323 Message Vulnerabilities
Original release date: January 13, 2004 Last revised: -- Source: CERT/CC, NISCC
A complete revision history can be found at the end of this file.
I. Description
The U.K. H.323 is an international standard protocol, published by the International Telecommunications Union, used to facilitate communication among telephony and multimedia systems. Examples of such systems include VoIP, video-conferencing equipment, and network devices that manage H.323 traffic. A test suite developed by NISCC and the University of Oulu Security Programming Group (OUSPG) has exposed multiple vulnerabilities in a variety of implementations of the H.323 protocol (specifically its connection setup sub-protocol H.225.0).
Information about individual vendor H.323 implementations is available in the Vendor Information section below, and in the Vendor Information section of NISCC Vulnerability Advisory 006489/H323.
The U.K. National Infrastructure Security Co-ordination Centre is tracking these vulnerabilities as NISCC/006489/H.323. The CERT/CC is tracking this issue as VU#749342. This reference number corresponds to CVE candidate CAN-2003-0819, as referenced in Microsoft Security Bulletin MS04-001.
II.
III. Solution
Apply a patch or upgrade
Appendix A and the Systems Affected section of Vulnerability Note VU#749342 contain information provided by vendors for this advisory (http://www.kb.cert.org/vuls/id/749342#systems).
However, as vendors report new information to the CERT/CC, we will only update VU#749342. If a particular vendor is not listed, we have not received their comments. Please contact your vendor directly.
Filter network traffic
Sites are encouraged to apply network packet filters to block access to the H.323 services at network borders. This can minimize the potential of denial-of-service attacks originating from outside the perimeter. The specific services that should be filtered include
* 1720/TCP
* 1720/UDP
If access cannot be filtered at the network perimeter, the CERT/CC recommends limiting access to only those external hosts that require H.323 for normal operation. As a general rule, filtering all types of network traffic that are not required for normal operation is recommended.
It is important to note that some firewalls process H.323 packets and may themselves be vulnerable to attack. As noted in some vendor recommendations like Cisco Security Advisory 20040113-h323 and Microsoft Security Bulletin MS04-001, certain sites may actually want to disable application layer inspection of H.323 network packets.
Protecting your infrastructure against these vulnerabilities may require careful coordination among application, computer, network, and telephony administrators. You may have to make tradeoffs between security and functionality until vulnerable products can be updated.
Appendix A. Please see the Systems Affected section of Vulnerability Note VU#749342 and the Vendor Information section of NISCC Vulnerability Advisory 006489/H323 for the latest information regarding the response of the vendor community to this issue.
3Com
No statement is currently available from the vendor regarding this
vulnerability.
Alcatel
No statement is currently available from the vendor regarding this
vulnerability.
Apple Computer Inc.
Apple: Not Vulnerable. Mac OS X and Mac OS X Server do not contain
the issue described in this note.
AT&T
No statement is currently available from the vendor regarding this
vulnerability.
Avaya
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Borderware
No statement is currently available from the vendor regarding this
vulnerability.
Check Point
No statement is currently available from the vendor regarding this
vulnerability.
BSDI
No statement is currently available from the vendor regarding this
vulnerability.
Cisco Systems Inc.
Please see
http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
Clavister
No statement is currently available from the vendor regarding this
vulnerability.
Computer Associates
No statement is currently available from the vendor regarding this
vulnerability.
Cyberguard
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Debian
No statement is currently available from the vendor regarding this
vulnerability.
D-Link Systems
No statement is currently available from the vendor regarding this
vulnerability.
Conectiva
No statement is currently available from the vendor regarding this
vulnerability.
EMC Corporation
No statement is currently available from the vendor regarding this
vulnerability.
Engarde
No statement is currently available from the vendor regarding this
vulnerability.
eSoft
We don't have an H.323 implementation and thus aren't affected by
this.
Extreme Networks
No statement is currently available from the vendor regarding this
vulnerability.
F5 Networks
No statement is currently available from the vendor regarding this
vulnerability.
Foundry Networks Inc.
No statement is currently available from the vendor regarding this
vulnerability.
FreeBSD
No statement is currently available from the vendor regarding this
vulnerability.
Fujitsu
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Global Technology Associates
No statement is currently available from the vendor regarding this
vulnerability.
Hitachi
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Hewlett-Packard Company
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Ingrian Networks
No statement is currently available from the vendor regarding this
vulnerability.
Intel
No statement is currently available from the vendor regarding this
vulnerability.
Intoto
No statement is currently available from the vendor regarding this
vulnerability.
Juniper Networks
No statement is currently available from the vendor regarding this
vulnerability.
Lachman
No statement is currently available from the vendor regarding this
vulnerability.
Linksys
No statement is currently available from the vendor regarding this
vulnerability.
Lotus Software
No statement is currently available from the vendor regarding this
vulnerability.
Lucent Technologies
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Microsoft Corporation
Please see
http://www.microsoft.com/technet/security/bulletin/MS04-001.asp
MontaVista Software
No statement is currently available from the vendor regarding this
vulnerability.
MandrakeSoft
No statement is currently available from the vendor regarding this
vulnerability.
Multi-Tech Systems Inc.
No statement is currently available from the vendor regarding this
vulnerability.
NEC Corporation
No statement is currently available from the vendor regarding this
vulnerability.
NetBSD
NetBSD does not ship any H.323 implementations as part of the
Operating System.
There are a number of third-party implementations available in the
pkgsrc system. As these products are found to be vulnerable, or
updated, the packages will be updated accordingly. The
audit-packages mechanism can be used to check for known-vulnerable
package versions.
Netfilter
No statement is currently available from the vendor regarding this
vulnerability.
NetScreen
No statement is currently available from the vendor regarding this
vulnerability.
Network Appliance
No statement is currently available from the vendor regarding this
vulnerability.
Nokia
No statement is currently available from the vendor regarding this
vulnerability.
Nortel Networks
The following Nortel Networks Generally Available products and
solutions are potentially affected by the vulnerabilities
identified in NISCC Vulnerability Advisory 006489/H323 and CERT
VU#749342:
Business Communications Manager (BCM) (all versions) is potentially
affected; more information is available in Product Advisory Alert
No. PAA 2003-0392-Global.
Succession 1000 IP Trunk and IP Peer Networking, and 802.11
Wireless IP Gateway are potentially affected; more information is
available in Product Advisory Alert No. PAA-2003-0465-Global.
For more information please contact
North America: 1-800-4NORTEL or 1-800-466-7835
Europe, Middle East and Africa: 00800 8008 9009,
or +44 (0) 870 907 9009
Contacts for other regions are available at
http://www.nortelnetworks.com/help/contact/global/
Or visit the eService portal at http://www.nortelnetworks.com/cs
under Advanced Search.
If you are a channel partner, more information can be found under
http://www.nortelnetworks.com/pic
under Advanced Search.
Novell
No statement is currently available from the vendor regarding this
vulnerability.
Objective Systems Inc.
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
OpenBSD
No statement is currently available from the vendor regarding this
vulnerability.
Openwall GNU/*/Linux
No statement is currently available from the vendor regarding this
vulnerability.
RadVision
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Red Hat Inc.
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Oracle Corporation
No statement is currently available from the vendor regarding this
vulnerability.
Riverstone Networks
No statement is currently available from the vendor regarding this
vulnerability.
Secure Computing Corporation
No statement is currently available from the vendor regarding this
vulnerability.
SecureWorks
No statement is currently available from the vendor regarding this
vulnerability.
Sequent
No statement is currently available from the vendor regarding this
vulnerability.
Sony Corporation
No statement is currently available from the vendor regarding this
vulnerability.
Stonesoft
No statement is currently available from the vendor regarding this
vulnerability.
Sun Microsystems Inc.
Sun SNMP does not provide support for H.323, so we are not
vulnerable. And so far we have not found any bundled products that
are affected by this vulnerability. We are also actively
investigating our unbundled products to see if they are affected.
Updates will be provided to this statement as they become
available.
SuSE Inc.
No statement is currently available from the vendor regarding this
vulnerability.
Symantec Corporation
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Unisys
No statement is currently available from the vendor regarding this
vulnerability.
TandBerg
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
Tumbleweed Communications Corp.
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
TurboLinux
No statement is currently available from the vendor regarding this
vulnerability.
uniGone
Please see the NISCC Vulnerability Advisory 006489/H323 at
http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
WatchGuard
No statement is currently available from the vendor regarding this
vulnerability.
Wirex
No statement is currently available from the vendor regarding this
vulnerability.
Wind River Systems Inc.
No statement is currently available from the vendor regarding this
vulnerability.
Xerox
No statement is currently available from the vendor regarding this
vulnerability.
ZyXEL
No statement is currently available from the vendor regarding this
vulnerability.
_________________________________________________________________
The CERT Coordination Center thanks the NISCC Vulnerability Management Team and the University of Oulu Security Programming Group (OUSPG) for coordinating the discovery and release of the technical details of this issue. ___________
Feedback may be directed to the authors: Jeffrey S. Havrilla, Mindi J. McDowell, Shawn V. Hernan and Jason A. Rafail
This document is available from: http://www.cert.org/advisories/CA-2004-01.html
CERT/CC Contact Information
Email: cert@cert.org Phone: +1 412-268-7090 (24-hour hotline) Fax: +1 412-268-6989 Postal address: CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 U.S.A.
CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends.
Using encryption
We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key
If you prefer to use DES, please call the CERT hotline for more information.
Getting security information
CERT publications and other security information are available from our web site http://www.cert.org/
To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo@cert.org. Please include in the body of your message
subscribe cert-advisory
- "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office.
NO WARRANTY Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.
Conditions for use, disclaimers, and sponsorship information
Copyright 2004 Carnegie Mellon University.
Revision History January 13, 2004: Initial release
-----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8
iQCVAwUBQASK7JZ2NNT/dVAVAQG65wP8C7DyEvZGz0HqXtRqk+PAjjpMqex1hdjT BfkT6oHMhTWIdvUE1mpAwnV7OPL+N+UugCC0bAEXQzBy/YkBBOptt7IZdIeOlInh AP0RO5zqt0GqMIrdW7P14iWBX2lLCQaMUgWNyvK4ZTNE9UzpOgBk2JonfBLjbH77 KeVgAqcfP2M= =p0GQ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200402-0049", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios 12.0", "scope": null, "trust": 5.1, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s", "scope": null, "trust": 3.9, "vendor": "cisco", "version": null }, { "model": "ios 12.1", "scope": null, "trust": 3.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e", "scope": null, "trust": 3.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t", "scope": null, "trust": 2.7, "vendor": "cisco", "version": null }, { "model": "ios 12.2 s", "scope": null, "trust": 2.7, "vendor": "cisco", "version": null }, { "model": "ios 12.2", "scope": null, "trust": 2.4, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s7", "scope": null, "trust": 1.8, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s1", "scope": null, "trust": 1.8, "vendor": "cisco", "version": null }, { "model": "proxy server", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "2.0" }, { "model": "ios 12.0 s8", "scope": null, "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "ios 12.2", "scope": "ne", "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st", "scope": null, "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ec", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s4", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.0 t", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s3", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.1 t", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e8", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e3", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st6", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e12", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e7", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 11.3", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st1", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s2", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s6", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "radvision", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tandberg", "version": null }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng fp2" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng with application intelligence" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng with application intelligence (r55)" }, { "model": "sunforum", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7" }, { "model": "internet security and acceleration server", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2000" }, { "model": "pathnavigator", "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng fp3" }, { "model": "sunforum", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "3d 1.0 (solaris 8" }, { "model": "soundstation ip", "scope": "eq", "trust": 0.8, "vendor": "polycom", "version": "3000" }, { "model": "viewstation", "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": "viavideo", "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": "soundpoint ip", "scope": "eq", "trust": 0.8, "vendor": "polycom", "version": "500" }, { "model": "viavideo ii", "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": "mgc", "scope": "eq", "trust": 0.8, "vendor": "polycom", "version": "25/50/100" }, { "model": "ipower", "scope": null, "trust": 0.8, "vendor": "polycom", "version": null }, { "model": "sunforum", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "3.2 (solaris 2.6" }, { "model": "sunforum", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 for )" }, { "model": "sunforum", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8" }, { "model": "soundpoint ip", "scope": "eq", "trust": 0.8, "vendor": "polycom", "version": "400" }, { "model": "vsx", "scope": "eq", "trust": 0.8, "vendor": "polycom", "version": "7000" }, { "model": "ios 12.0 st7", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xa", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "isa server fp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2000" }, { "model": "isa server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.0 s5a", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.1" }, { "model": "ios 12.1 aa", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xm4", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2 bx", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t3", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st2", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e4", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s5", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "isa server sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.2 xh", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e1", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.1(22)" }, { "model": "opencall multiservice controller", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "ios 12.1 yh3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 [ vpn des strong ] sp2 build", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "++4.141716" }, { "model": "ios 12.2yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xb14", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1aa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xu2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t1a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(1)" }, { "model": "ios 12.1 yf4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2" }, { "model": "ios 12.2 xa5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(7)" }, { "model": "pwlib", "scope": "eq", "trust": 0.3, "vendor": "pwlib", "version": "1.4.7" }, { "model": "ios 12.1 yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0(27)" }, { "model": "ios 11.3ha", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(5)" }, { "model": "ios 12.1xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s4a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(20)" }, { "model": "ios 12.2zl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xs1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s8a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.2 t0a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3ma", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sxa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1x", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 yz2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(13)" }, { "model": "ios 12.0 t1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 mx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications v-gate", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "4000" }, { "model": "ios 12.2 ya8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xb15", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ec1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 12.2 xh2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 11.3 t2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xi1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e9", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(14.5)" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "ios 12.2 s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "netstructure host media processing software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "1.0" }, { "model": "ios 12.0xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sg5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "ios 12.1 xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 mc1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ec", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios t", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.3.1" }, { "model": "virtual communications click to meet express", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "2.2" }, { "model": "sg208", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "ios 12.1xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(11)" }, { "model": "ios 12.1xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ze", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(18.4)" }, { "model": "ios 12.2 sl1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 t3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 ya1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sy1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.2(17)" }, { "model": "ios 12.1 e12", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks succession", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "1000" }, { "model": "ios 12.2dd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0st", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s10", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "ios 12.2xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications click to meet premier", "scope": null, "trust": 0.3, "vendor": "first", "version": null }, { "model": "fedora core3", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "ios 12.1xp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications click to meet express", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "2.0" }, { "model": "ios 12.2xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(17)" }, { "model": "ios 12.1xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 yy3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xy6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xk2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(8)" }, { "model": "ios 12.2t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xw1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t9", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xp4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e18", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications click to meet express", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "1.02" }, { "model": "point software next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios 12.3 t", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1xv" }, { "model": "ios 12.1 yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xd1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ez2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xt3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(8)" }, { "model": "pwlib-1.2.12-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "ios 12.2xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2mx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications conference server", "scope": null, "trust": 0.3, "vendor": "first", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(7)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.3" }, { "model": "ios 12.1xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(4)" }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.2 t10", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communication manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "ios 12.0 st4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "netstructure pbx-ip media gateway", "scope": null, "trust": 0.3, "vendor": "intel", "version": null }, { "model": "ios 12.0xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 xk2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 yy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ez", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yc2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications click to meet express", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "1.0" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(2)" }, { "model": "ios 12.2 zh3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sg5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(5)xv3" }, { "model": "ios 12.1 yf2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "fedora core1", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "pwlib", "scope": "eq", "trust": 0.3, "vendor": "pwlib", "version": "1.5.0" }, { "model": "point software firewall-1 [ vpn des strong ] build", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "++4.141439" }, { "model": "sunforum", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.2" }, { "model": "ios 12.1 e14", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 12.2yk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software ng-ai", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios 12.2dx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 dx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(9)" }, { "model": "ios 12.2zd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.1 e16", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yd6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "bts", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10200" }, { "model": "ios 12.2 mx1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e14", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xr2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ez1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software next generation fp3 hf2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(12.05)" }, { "model": "ios 12.2yn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(1)" }, { "model": "ios 12.1 xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e13", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3wa4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yi1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yv", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xi2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 12.2 t5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "ios 12.1 yb4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "ios 12.2 t4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0(28)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(3)" }, { "model": "ios 12.0 st5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3 db1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(3)" }, { "model": "ios 12.2 xd4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "ios 12.2zg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xg5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.3.1" }, { "model": "ios 12.1 xp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xl4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(1.1)" }, { "model": "netstructure ipt ip boards", "scope": null, "trust": 0.3, "vendor": "intel", "version": null }, { "model": "internet service node", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1e", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yd2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 b", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3 xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(18.2)" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 12.2 xd3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zj3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xu1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios 12.2xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(5)xv" }, { "model": "ios 12.0 s2a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t6", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2mc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t10", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "fedora core2", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "opencall multiservice controller patch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.137" }, { "model": "networks wireless ip gateway", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "(802.11)" }, { "model": "ios 12.1yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st8", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(5)xv5" }, { "model": "sg203", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.31.29" }, { "model": "ios 12.2 yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s3b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(4)" }, { "model": "ios 12.1xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3 db2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zj1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2(17)" }, { "model": "point software nokia voyager", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ios 12.1 ec3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 t12", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(3.2)" }, { "model": "ios 11.3da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xt3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios ed", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.3.1" }, { "model": "ios 12.2 zl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3na", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zl1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3db", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.2 xh3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "ios 12.2xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zb7", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 xn1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.3" }, { "model": "ios 12.1xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.3.11" }, { "model": "ata-186", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 t9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xb4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 11.3aa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1" }, { "model": "ios 12.2zj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.3.1" }, { "model": "ios 12.2 xm2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yc1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yb5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e10", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 dd3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "ios 12.2xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 t2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1(5)xv4" }, { "model": "ios 12.1 xs2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios 12.2 yw2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ym", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 t15", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp8", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.2 xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3(3)" }, { "model": "ios 12.2 xj1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 yx1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks business communications manager", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "0" }, { "model": "ios 12.1 xm7", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 t5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zc", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 ya7", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 zj2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "virtual communications v-gate", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "5000" }, { "model": "ios 12.2yw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 aa1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e6", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "netstructure dmip ip boards", "scope": null, "trust": 0.3, "vendor": "intel", "version": null }, { "model": "point software firewall-1 [ vpn des ]", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "+4.1" }, { "model": "opencall multiservice controller patch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.146" }, { "model": "ios 12.2 yw3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(26)" }, { "model": "conference connection", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "virtual communications click to meet express", "scope": "eq", "trust": 0.3, "vendor": "first", "version": "2.1" }, { "model": "ios 12.2 xb11", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pwlib-1.3.3-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "ios 12.2 xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0(9)" }, { "model": "ios 12.2 zh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 st3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software next generation fp3 hf1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "ios 12.2 sx1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xa1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software firewall-1 sp7", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "ios 12.2 xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sunforum 3d", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0" }, { "model": "ios 12.2 xb3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "small business server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "small business server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20000" }, { "model": "proxy server sp1", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2.0" }, { "model": "proxy server", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "2.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#749342" }, { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:proxy_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:proxy_server:2.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0819" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "University of Oulu Security Programming Group", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-061" } ], "trust": 0.6 }, "cve": "CVE-2003-0819", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2003-0819", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-0819", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#749342", "trust": 0.8, "value": "13.67" }, { "author": "CNNVD", "id": "CNNVD-200402-061", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#749342" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. A number of vulnerabilities have been discovered in various implementations of the multimedia telephony protocols H.323 and H.225. Voice over Internet Protocol (VoIP) and video conferencing equpiment and software can use these protocols to interoperate over a variety of computer networks. The majority of the vulnerabilities discovered are limited to denial of service impacts; however, several may allow unauthorized code execution. Microsoft ISA Server Is operating in cache mode, Microsoft Firewall Service Is disabled by default and is not affected by this issue. In addition, H.323 Vulnerabilities related to this vulnerability have been confirmed in other systems that implement the protocol. For other system information, NISCC-006489 (JVN) , NISCC Advisory 006489/h323(CPNI Advisory 00387) Please check also. Caution: Of this vulnerability CVSS The basic value is \" Microsoft ISA Server \" Is calculated for. Other systems are not considered.According to the information provided by Microsoft, Microsoft ISA Server Is specific H.323 If traffic is handled, arbitrary code may be executed. Also, H.323 Service disruption for other systems that implement the protocol (DoS) An attacker may be attacked or a third party may be able to execute arbitrary code remotely. The condition presents itself due to insufficient boundary checks performed by the Microsoft Firewall Service on specially crafted H.323 traffic. This may lead to complete control of the vulnerable system. \n-----BEGIN PGP SIGNED MESSAGE-----\n\nCERT Advisory CA-2004-01 Multiple H.323 Message Vulnerabilities\n\n Original release date: January 13, 2004\n Last revised: --\n Source: CERT/CC, NISCC\n\n A complete revision history can be found at the end of this file. \n\nI. Description\n\n The U.K. H.323 is\n an international standard protocol, published by the International\n Telecommunications Union, used to facilitate communication among\n telephony and multimedia systems. Examples of such systems include\n VoIP, video-conferencing equipment, and network devices that manage\n H.323 traffic. A test suite developed by NISCC and the University of\n Oulu Security Programming Group (OUSPG) has exposed multiple\n vulnerabilities in a variety of implementations of the H.323 protocol\n (specifically its connection setup sub-protocol H.225.0). \n\n Information about individual vendor H.323 implementations is available\n in the Vendor Information section below, and in the Vendor Information\n section of NISCC Vulnerability Advisory 006489/H323. \n\n The U.K. National Infrastructure Security Co-ordination Centre is\n tracking these vulnerabilities as NISCC/006489/H.323. The CERT/CC is\n tracking this issue as VU#749342. This reference number corresponds to\n CVE candidate CAN-2003-0819, as referenced in Microsoft Security\n Bulletin MS04-001. \n\nII. \n\nIII. Solution\n\nApply a patch or upgrade\n\n Appendix A and the Systems Affected section of Vulnerability Note\n VU#749342 contain information provided by vendors for this advisory\n (\u003chttp://www.kb.cert.org/vuls/id/749342#systems\u003e). \n\n However, as vendors report new information to the CERT/CC, we will\n only update VU#749342. If a particular vendor is not listed, we have\n not received their comments. Please contact your vendor directly. \n\nFilter network traffic\n\n Sites are encouraged to apply network packet filters to block access\n to the H.323 services at network borders. This can minimize the\n potential of denial-of-service attacks originating from outside the\n perimeter. The specific services that should be filtered include\n\n * 1720/TCP\n * 1720/UDP\n\n If access cannot be filtered at the network perimeter, the CERT/CC\n recommends limiting access to only those external hosts that require\n H.323 for normal operation. As a general rule, filtering all types of\n network traffic that are not required for normal operation is\n recommended. \n\n It is important to note that some firewalls process H.323 packets and\n may themselves be vulnerable to attack. As noted in some vendor\n recommendations like Cisco Security Advisory 20040113-h323 and\n Microsoft Security Bulletin MS04-001, certain sites may actually want\n to disable application layer inspection of H.323 network packets. \n\n Protecting your infrastructure against these vulnerabilities may\n require careful coordination among application, computer, network, and\n telephony administrators. You may have to make tradeoffs between\n security and functionality until vulnerable products can be updated. \n\nAppendix A. Please see the Systems Affected section of Vulnerability\n Note VU#749342 and the Vendor Information section of NISCC\n Vulnerability Advisory 006489/H323 for the latest information\n regarding the response of the vendor community to this issue. \n\n3Com\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nAlcatel\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nApple Computer Inc. \n\n Apple: Not Vulnerable. Mac OS X and Mac OS X Server do not contain\n the issue described in this note. \n\nAT\u0026T\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nAvaya\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nBorderware\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nCheck Point\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nBSDI\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nCisco Systems Inc. \n\n Please see\n http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml\n\nClavister\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nComputer Associates\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nCyberguard\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nDebian\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nD-Link Systems\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nConectiva\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nEMC Corporation\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nEngarde\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\neSoft\n\n We don\u0027t have an H.323 implementation and thus aren\u0027t affected by\n this. \n\nExtreme Networks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nF5 Networks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nFoundry Networks Inc. \n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nFreeBSD\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nFujitsu\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nGlobal Technology Associates\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nHitachi\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nHewlett-Packard Company\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nIngrian Networks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nIntel\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nIntoto\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nJuniper Networks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nLachman\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nLinksys\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nLotus Software\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nLucent Technologies\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nMicrosoft Corporation\n\n Please see\n http://www.microsoft.com/technet/security/bulletin/MS04-001.asp\n\nMontaVista Software\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nMandrakeSoft\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nMulti-Tech Systems Inc. \n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNEC Corporation\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNetBSD\n\n NetBSD does not ship any H.323 implementations as part of the\n Operating System. \n\n There are a number of third-party implementations available in the\n pkgsrc system. As these products are found to be vulnerable, or\n updated, the packages will be updated accordingly. The\n audit-packages mechanism can be used to check for known-vulnerable\n package versions. \n\nNetfilter\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNetScreen\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNetwork Appliance\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNokia\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nNortel Networks\n\n The following Nortel Networks Generally Available products and\n solutions are potentially affected by the vulnerabilities\n identified in NISCC Vulnerability Advisory 006489/H323 and CERT\n VU#749342:\n\n Business Communications Manager (BCM) (all versions) is potentially\n affected; more information is available in Product Advisory Alert\n No. PAA 2003-0392-Global. \n\n Succession 1000 IP Trunk and IP Peer Networking, and 802.11\n Wireless IP Gateway are potentially affected; more information is\n available in Product Advisory Alert No. PAA-2003-0465-Global. \n\n For more information please contact\n\n North America: 1-800-4NORTEL or 1-800-466-7835\n Europe, Middle East and Africa: 00800 8008 9009,\n or +44 (0) 870 907 9009\n\n Contacts for other regions are available at\n\n http://www.nortelnetworks.com/help/contact/global/\n\n Or visit the eService portal at http://www.nortelnetworks.com/cs\n under Advanced Search. \n\n If you are a channel partner, more information can be found under\n\n http://www.nortelnetworks.com/pic\n\n under Advanced Search. \n\nNovell\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nObjective Systems Inc. \n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nOpenBSD\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nOpenwall GNU/*/Linux\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nRadVision\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nRed Hat Inc. \n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nOracle Corporation\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nRiverstone Networks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSecure Computing Corporation\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSecureWorks\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSequent\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSony Corporation\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nStonesoft\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSun Microsystems Inc. \n\n Sun SNMP does not provide support for H.323, so we are not\n vulnerable. And so far we have not found any bundled products that\n are affected by this vulnerability. We are also actively\n investigating our unbundled products to see if they are affected. \n Updates will be provided to this statement as they become\n available. \n\nSuSE Inc. \n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nSymantec Corporation\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nUnisys\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nTandBerg\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nTumbleweed Communications Corp. \n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nTurboLinux\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nuniGone\n\n Please see the NISCC Vulnerability Advisory 006489/H323 at\n http://www.uniras.gov.uk/vuls/2004/006489/h323.htm\n\nWatchGuard\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nWirex\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nWind River Systems Inc. \n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nXerox\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n\nZyXEL\n\n No statement is currently available from the vendor regarding this\n vulnerability. \n _________________________________________________________________\n\n The CERT Coordination Center thanks the NISCC Vulnerability Management\n Team and the University of Oulu Security Programming Group (OUSPG) for\n coordinating the discovery and release of the technical details of\n this issue. \n _________________________________________________________________\n\n Feedback may be directed to the authors: Jeffrey S. Havrilla, Mindi J. \n McDowell, Shawn V. Hernan and Jason A. Rafail\n ______________________________________________________________________\n\n This document is available from:\n http://www.cert.org/advisories/CA-2004-01.html\n ______________________________________________________________________\n\nCERT/CC Contact Information\n\n Email: cert@cert.org\n Phone: +1 412-268-7090 (24-hour hotline)\n Fax: +1 412-268-6989\n Postal address:\n CERT Coordination Center\n Software Engineering Institute\n Carnegie Mellon University\n Pittsburgh PA 15213-3890\n U.S.A. \n\n CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /\n EDT(GMT-4) Monday through Friday; they are on call for emergencies\n during other hours, on U.S. holidays, and on weekends. \n\nUsing encryption\n\n We strongly urge you to encrypt sensitive information sent by email. \n Our public PGP key is available from\n http://www.cert.org/CERT_PGP.key\n\n If you prefer to use DES, please call the CERT hotline for more\n information. \n\nGetting security information\n\n CERT publications and other security information are available from\n our web site\n http://www.cert.org/\n\n To subscribe to the CERT mailing list for advisories and bulletins,\n send email to majordomo@cert.org. Please include in the body of your\n message\n\n subscribe cert-advisory\n\n * \"CERT\" and \"CERT Coordination Center\" are registered in the U.S. \n Patent and Trademark Office. \n ______________________________________________________________________\n\n NO WARRANTY\n Any material furnished by Carnegie Mellon University and the Software\n Engineering Institute is furnished on an \"as is\" basis. Carnegie\n Mellon University makes no warranties of any kind, either expressed or\n implied as to any matter including, but not limited to, warranty of\n fitness for a particular purpose or merchantability, exclusivity or\n results obtained from use of the material. Carnegie Mellon University\n does not make any warranty of any kind with respect to freedom from\n patent, trademark, or copyright infringement. \n ______________________________________________________________________\n\n Conditions for use, disclaimers, and sponsorship information\n\n Copyright 2004 Carnegie Mellon University. \n\n Revision History\nJanuary 13, 2004: Initial release\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 6.5.8\n\niQCVAwUBQASK7JZ2NNT/dVAVAQG65wP8C7DyEvZGz0HqXtRqk+PAjjpMqex1hdjT\nBfkT6oHMhTWIdvUE1mpAwnV7OPL+N+UugCC0bAEXQzBy/YkBBOptt7IZdIeOlInh\nAP0RO5zqt0GqMIrdW7P14iWBX2lLCQaMUgWNyvK4ZTNE9UzpOgBk2JonfBLjbH77\nKeVgAqcfP2M=\n=p0GQ\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CERT/CC", "id": "VU#749342" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" }, { "db": "PACKETSTORM", "id": "32511" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#749342", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2003-0819", "trust": 3.0 }, { "db": "BID", "id": "9406", "trust": 2.7 }, { "db": "BID", "id": "9408", "trust": 2.7 }, { "db": "SECUNIA", "id": "10611", "trust": 1.6 }, { "db": "SECTRACK", "id": "1008698", "trust": 1.6 }, { "db": "SECUNIA", "id": "10869", "trust": 0.8 }, { "db": "XF", "id": "14167", "trust": 0.8 }, { "db": "SECTRACK", "id": "1008846", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000008", "trust": 0.8 }, { "db": "MS", "id": "MS04-001", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:478", "trust": 0.6 }, { "db": "CERT/CC", "id": "CA-2004-01", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200402-061", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "32511", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#749342" }, { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "PACKETSTORM", "id": "32511" }, { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "id": "VAR-200402-0049", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.7558744 }, "last_update_date": "2023-12-18T12:24:36.396000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "H.323 Vulnerability", "trust": 0.8, "url": "http://www.checkpoint.com/services/techsupport/alerts/h323.html" }, { "title": "MS04-001", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms04-001.mspx" }, { "title": "CERT/NISCC Advisory - MGC", "trust": 0.8, "url": "http://www.polycom.com/common/pw_item_show_doc/0,,2752,00.pdf" }, { "title": "CERT/NISCC Advisory - PathNavigator", "trust": 0.8, "url": "http://www.polycom.com/common/pw_item_show_doc/0,,2749,00.pdf" }, { "title": "CERT/NISCC Advisory - SoundPoint IP/SoundStation IP", "trust": 0.8, "url": "http://www.polycom.com/common/pw_item_show_doc/0,,2750,00.pdf" }, { "title": "CERT/NISCC Advisory - Video Division", "trust": 0.8, "url": "http://www.polycom.com/common/pw_item_show_doc/0,,2751,00.pdf" }, { "title": "57476", "trust": 0.8, "url": "http://jp.sunsolve.sun.com/search/document.do?assetkey=1-26-57476-1" }, { "title": "57476", "trust": 0.8, "url": "http://jp.sunsolve.sun.com/search/document.do?assetkey=1-26-57476-3" }, { "title": "H.323 \u306b\u95a2\u3059\u308b\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.checkpoint.co.jp/techsupport/alerts/h323.html" }, { "title": "MS04-001", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms04-001.mspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "NVD", "id": "CVE-2003-0819" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.uniras.gov.uk/vuls/2004/006489/h323.htm" }, { "trust": 2.8, "url": "http://www.cert.org/advisories/ca-2004-01.html" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/9408" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/9406" }, { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/749342" }, { "trust": 1.6, "url": "http://secunia.com/advisories/10611" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id?1008698" }, { "trust": 1.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-001" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a478" }, { "trust": 0.8, "url": "http://www.itu.int/itudoc/itu-t/rec/h/h225-0.html" }, { "trust": 0.8, "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/h2250v4/index.html" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/o-051.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0819" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040113-00387.xml" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr040301.txtq" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr040501.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr040901.txt" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-006489/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2004-01" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-060525/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trca-2004-01/" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0819" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20040113-00387.pdf" }, { "trust": 0.8, "url": "http://secunia.com/advisories/10869/" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2004/jan/1008846.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/14167" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20040114_112014.html" }, { "trust": 0.7, "url": "http://www.microsoft.com/technet/security/bulletin/ms04-001.asp" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:478" }, { "trust": 0.4, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/alerts/h323.html" }, { "trust": 0.3, "url": "http://support.fvc.com/eng/docs/misc_docs/h.323_security_bulletin.pdf" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/h323_hf.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101429-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://support.avaya.com/japple/css/japple?temp.groupid=128450\u0026temp.selectedfamily=128451\u0026temp.selectedproduct=154235\u0026temp.selectedbucket=126655\u0026temp.feedbackstate=askforfeedback\u0026temp.documentid=15871" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-001.asp" }, { "trust": 0.1, "url": "http://www.cert.org/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/749342#systems\u003e)." }, { "trust": 0.1, "url": "http://www.cert.org/cert_pgp.key" }, { "trust": 0.1, "url": "http://www.nortelnetworks.com/help/contact/global/" }, { "trust": 0.1, "url": "http://www.nortelnetworks.com/cs" }, { "trust": 0.1, "url": "http://www.nortelnetworks.com/pic" } ], "sources": [ { "db": "CERT/CC", "id": "VU#749342" }, { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "PACKETSTORM", "id": "32511" }, { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#749342" }, { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" }, { "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "db": "PACKETSTORM", "id": "32511" }, { "db": "NVD", "id": "CVE-2003-0819" }, { "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-01-13T00:00:00", "db": "CERT/CC", "id": "VU#749342" }, { "date": "2004-01-13T00:00:00", "db": "BID", "id": "9406" }, { "date": "2004-01-13T00:00:00", "db": "BID", "id": "9408" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "date": "2004-01-14T18:44:00", "db": "PACKETSTORM", "id": "32511" }, { "date": "2004-02-17T05:00:00", "db": "NVD", "id": "CVE-2003-0819" }, { "date": "2004-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-07-29T00:00:00", "db": "CERT/CC", "id": "VU#749342" }, { "date": "2007-11-15T00:39:00", "db": "BID", "id": "9406" }, { "date": "2009-07-12T02:06:00", "db": "BID", "id": "9408" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000008" }, { "date": "2018-10-12T21:33:24.757000", "db": "NVD", "id": "CVE-2003-0819" }, { "date": "2006-09-25T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "9406" }, { "db": "BID", "id": "9408" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in H.323 implementations", "sources": [ { "db": "CERT/CC", "id": "VU#749342" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-061" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.