var-200502-0053
Vulnerability from variot
The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. This issue is due to a failure of the affected software to properly handle malformed network data. Specifically, multiple denial of service vulnerabilities and a single default administrator password issues were reported. The default password issue may allow an unauthorized user to gain administrator access to an affected device. ACNS is a Cisco digital media delivery solution that optimizes the delivery quality of video traffic from the data center to branch offices over the WAN
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200502-0053", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "content delivery manager", scope: "eq", trust: 1.9, vendor: "cisco", version: "4630", }, { model: null, scope: null, trust: 1.6, vendor: "cisco", version: null, }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0.1", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.1", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0.3", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "5.0.5", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "4.2.9", }, { model: "application and content networking software", scope: "eq", trust: 1.6, vendor: "cisco", version: "4.2.11", }, { model: "content distribution manager 4650", scope: "eq", trust: 1.6, vendor: "cisco", version: "4.1", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "7325", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "7320", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "590", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "565", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "560", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "510", }, { model: "content engine", scope: "eq", trust: 1.3, vendor: "cisco", version: "507", }, { model: "content delivery manager", scope: "eq", trust: 1.3, vendor: "cisco", version: "4650", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "7320_3.1", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "7320_4.0", }, { model: "application and content networking software", scope: "eq", trust: 1, vendor: "cisco", version: "4.1.1", }, { model: "content engine module for cisco router", scope: "eq", trust: 1, vendor: "cisco", version: "3700_series", }, { model: "content distribution manager 4630", scope: "eq", trust: 1, vendor: "cisco", version: "4.0", }, { model: "enterprise content delivery network software", scope: "eq", trust: 1, vendor: "cisco", version: "4.1", }, { model: "application and content networking software", scope: "eq", trust: 1, vendor: "cisco", version: "\\(acns\\)", }, { model: "content engine module for cisco router", scope: "eq", trust: 1, vendor: "cisco", version: "3800_series", }, { model: "content engine module for cisco router", scope: "eq", trust: 1, vendor: "cisco", version: "3600_series", }, { model: "application and content networking software", scope: "eq", trust: 1, vendor: "cisco", version: "4.2", }, { model: "content engine module for cisco router", scope: "eq", trust: 1, vendor: "cisco", version: "2800_series", }, { model: "content distribution manager 4630", scope: "eq", trust: 1, vendor: "cisco", version: "4.1", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "590_4.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "560_2.2_.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "590_2.2_.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "507_3.1", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "7320_4.1", }, { model: "content router 4450", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "content distribution manager 4670", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "507_4.0", }, { model: "content router 4430", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "content distribution manager 4650", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "507_2.2_.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "560_3.1", }, { model: "content distribution manager 4650", scope: "eq", trust: 1, vendor: "cisco", version: "4.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "560_4.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "590_4.1", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "7320_2.2_.0", }, { model: "enterprise content delivery network software", scope: "eq", trust: 1, vendor: "cisco", version: "4.0", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "507_4.1", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "590_3.1", }, { model: "application and content networking software", scope: "eq", trust: 1, vendor: "cisco", version: "4.1.3", }, { model: "content engine", scope: "eq", trust: 1, vendor: "cisco", version: "560_4.1", }, { model: "application and content networking software", scope: "eq", trust: 1, vendor: "cisco", version: "4.0.3", }, { model: "content distribution manager 4630", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "content engine module for cisco router", scope: "eq", trust: 1, vendor: "cisco", version: "2600_series", }, { model: "application & content networking software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "content distribution manager 4670", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "4450", }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "44304.1", }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "44304.0", }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "4430", }, { model: "content engine module for cisco router series", scope: "eq", trust: 0.3, vendor: "cisco", version: "3800", }, { model: "content engine module for cisco router series", scope: "eq", trust: 0.3, vendor: "cisco", version: "3700", }, { model: "content engine module for cisco router series", scope: "eq", trust: 0.3, vendor: "cisco", version: "3600", }, { model: "content engine module for cisco router series", scope: "eq", trust: 0.3, vendor: "cisco", version: "2800", }, { model: "content engine module for cisco router series", scope: "eq", trust: 0.3, vendor: "cisco", version: "2600", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73204.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73204.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73203.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73202.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5904.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5904.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5903.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5902.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5604.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5604.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5603.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5602.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5074.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5074.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5073.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5072.2.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4670", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46504.1", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46504.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4650", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46304.1", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46304.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4630", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2.3.9", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1.13.7", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1.11.6", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0.17.6", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0.5", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0.3", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0.1", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2.11", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2.9", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2.7", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1.3", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1.1", }, { model: "application & content networking software", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.0.3", }, { model: "application & content networking software", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.2.3.9", }, { model: "application & content networking software", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.2.1.7", }, { model: "application & content networking software", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.1.13.7", }, { model: "application & content networking software", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.1.11.6", }, { model: "application & content networking software", scope: "ne", trust: 0.3, vendor: "cisco", version: "5.0.17.6", }, ], sources: [ { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "BID", id: "12648", }, { db: "NVD", id: "CVE-2005-0598", }, { db: "CNNVD", id: "CNNVD-200502-094", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_delivery_manager:4650:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:507_2.2_.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7320_2.2_.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3600_series:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3700_series:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3800_series:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_delivery_manager:4630:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4670:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:560_2.2_.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2600_series:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2800_series:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:\\(acns\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:510:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:590_2.2_.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7325:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:565:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:content_router_4450:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2005-0598", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "CNNVD", id: "CNNVD-200502-094", }, ], trust: 0.6, }, cve: "CVE-2005-0598", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-11807", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2005-0598", trust: 1, value: "MEDIUM", }, { author: "CARNEGIE MELLON", id: "VU#579240", trust: 0.8, value: "3.47", }, { author: "CARNEGIE MELLON", id: "VU#360296", trust: 0.8, value: "3.47", }, { author: "CNNVD", id: "CNNVD-200502-094", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-11807", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "VULHUB", id: "VHN-11807", }, { db: "NVD", id: "CVE-2005-0598", }, { db: "CNNVD", id: "CNNVD-200502-094", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. This issue is due to a failure of the affected software to properly handle malformed network data. \nSpecifically, multiple denial of service vulnerabilities and a single default administrator password issues were reported. The default password issue may allow an unauthorized user to gain administrator access to an affected device. ACNS is a Cisco digital media delivery solution that optimizes the delivery quality of video traffic from the data center to branch offices over the WAN", sources: [ { db: "NVD", id: "CVE-2005-0598", }, { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "BID", id: "12648", }, { db: "VULHUB", id: "VHN-11807", }, ], trust: 2.7, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "SECUNIA", id: "14395", trust: 3.3, }, { db: "BID", id: "12648", trust: 2.8, }, { db: "CERT/CC", id: "VU#579240", trust: 2.5, }, { db: "NVD", id: "CVE-2005-0598", trust: 2, }, { db: "SECTRACK", id: "1013286", trust: 1.6, }, { db: "XF", id: "19469", trust: 1.4, }, { db: "OSVDB", id: "14122", trust: 0.8, }, { db: "XF", id: "19468", trust: 0.8, }, { db: "OSVDB", id: "14121", trust: 0.8, }, { db: "CERT/CC", id: "VU#360296", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-200502-094", trust: 0.7, }, { db: "CISCO", id: "20050224 ACNS DENIAL OF SERVICE AND DEFAULT ADMIN PASSWORD VULNERABILITIES", trust: 0.6, }, { db: "VULHUB", id: "VHN-11807", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "VULHUB", id: "VHN-11807", }, { db: "BID", id: "12648", }, { db: "NVD", id: "CVE-2005-0598", }, { db: "CNNVD", id: "CNNVD-200502-094", }, ], }, id: "VAR-200502-0053", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-11807", }, ], trust: 0.01, }, last_update_date: "2023-12-18T12:32:58.849000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2005-0598", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 3.3, url: "http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml", }, { trust: 2.5, url: "http://secunia.com/advisories/14395", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/12648", }, { trust: 1.7, url: "http://www.kb.cert.org/vuls/id/579240", }, { trust: 1.6, url: "http://securitytracker.com/alerts/2005/feb/1013286.html", }, { trust: 1.4, url: "http://xforce.iss.net/xforce/xfdb/19469", }, { trust: 1.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19469", }, { trust: 0.8, url: "http://www.cisco.com/univercd/cc/td/doc/product/webscale/uce/acns51/deploy51/51stream.htm#wp1039106", }, { trust: 0.8, url: "http://secunia.com/advisories/14395/", }, { trust: 0.8, url: "http://osvdb.org/displayvuln.php?osvdb_id=14122", }, { trust: 0.8, url: "http://www.securityfocus.com/bid/12648 ", }, { trust: 0.8, url: "http://xforce.iss.net/xforce/xfdb/19468", }, { trust: 0.8, url: "http://www.osvdb.org/displayvuln.php?osvdb_id=14121", }, { trust: 0.3, url: "http://www.cisco.com/en/us/products/sw/conntsw/ps491/", }, { trust: 0.3, url: "/archive/1/391426", }, ], sources: [ { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "VULHUB", id: "VHN-11807", }, { db: "BID", id: "12648", }, { db: "NVD", id: "CVE-2005-0598", }, { db: "CNNVD", id: "CNNVD-200502-094", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#579240", }, { db: "CERT/CC", id: "VU#360296", }, { db: "VULHUB", id: "VHN-11807", }, { db: "BID", id: "12648", }, { db: "NVD", id: "CVE-2005-0598", }, { db: "CNNVD", id: "CNNVD-200502-094", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2005-03-10T00:00:00", db: "CERT/CC", id: "VU#579240", }, { date: "2005-06-08T00:00:00", db: "CERT/CC", id: "VU#360296", }, { date: "2005-02-24T00:00:00", db: "VULHUB", id: "VHN-11807", }, { date: "2005-02-24T00:00:00", db: "BID", id: "12648", }, { date: "2005-02-24T05:00:00", db: "NVD", id: "CVE-2005-0598", }, { date: "2005-02-24T00:00:00", db: "CNNVD", id: "CNNVD-200502-094", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2005-03-10T00:00:00", db: "CERT/CC", id: "VU#579240", }, { date: "2005-06-08T00:00:00", db: "CERT/CC", id: "VU#360296", }, { date: "2018-10-30T00:00:00", db: "VULHUB", id: "VHN-11807", }, { date: "2015-03-19T08:21:00", db: "BID", id: "12648", }, { date: "2018-10-30T16:25:18.480000", db: "NVD", id: "CVE-2005-0598", }, { date: "2005-10-20T00:00:00", db: "CNNVD", id: "CNNVD-200502-094", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200502-094", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco ACNS RealServer RealSubscruber vulnerable to DoS via malformed IP packets", sources: [ { db: "CERT/CC", id: "VU#579240", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-200502-094", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.