var-200512-0215
Vulnerability from variot
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Multiple unspecified Cisco Catalyst switches are prone to a denial of service vulnerability. These devices are susceptible to a remote denial of service vulnerability when handling TCP 'LanD' packets. This issue allows remote attackers to crash affected devices, or to temporarily block further network routing functionality. This will deny further network services to legitimate users. As no specific Cisco devices were identified by the reporter of this issue, all Cisco Catalyst devices have been marked as vulnerable. This BID will be updated as further information on affected packages is available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0215", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "catalyst csx", scope: "eq", trust: 2.4, vendor: "cisco", version: "60005.3", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.6\\(1\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.2\\(2\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.1", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "11.2\\(8.2\\)sa6", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.6\\(2\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "6.3\\(5\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.1\\(2\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "7.5\\(1\\)", }, { model: "catos", scope: "eq", trust: 1.6, vendor: "cisco", version: "6.4\\(4a\\)", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.0\\(5.2\\)xu", }, { model: "catalyst 6500 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catalyst 8500", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst", scope: "eq", trust: 1, vendor: "cisco", version: "4.5_\\(10\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(8\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(4\\)", }, { model: "catalyst 7600 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(1a\\)", }, { model: "catalyst 6000", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4908g-l3", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4912g", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(1\\)", }, { model: "catalyst 2926gl", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4200", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst", scope: "eq", trust: 1, vendor: "cisco", version: "sup3", }, { model: "catalyst 7600 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catalyst 2948-ge-tx", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(1\\)", }, { model: "catalyst 3750", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 7600", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.4\\(4\\)", }, { model: "catalyst 8540csr", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.2\\(3\\)", }, { model: "catalyst 3900", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.3\\(0.7\\)pan", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(1a\\)csx", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(3\\)csx", }, { model: "catalyst 4500", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 3200", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(2\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(7\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.4\\(1\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(1c\\)", }, { model: "catalyst 6000 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catalyst 2800 series", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2926", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2970", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.1\\(2a\\)", }, { model: "catalyst 2900", scope: "eq", trust: 1, vendor: "cisco", version: "lre_xl", }, { model: "catalyst 1200 series", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(3\\)", }, { model: "catalyst 2820", scope: "eq", trust: 1, vendor: "cisco", version: "9.0_0.07", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(7\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(13\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(1\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(6\\)csx", }, { model: "catalyst 4510r", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4948", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4000", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst", scope: "eq", trust: 1, vendor: "cisco", version: "sup2plus", }, { model: "catalyst 3000", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 8540msr", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 5509", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2948g-l3", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(4\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(2.13\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(7\\)", }, { model: "catalyst 7600 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(4\\)csx", }, { model: "catalyst 2902", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6000 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catalyst ws-c2924-xl", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(13a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(4b\\)", }, { model: "catalyst 1900 series", scope: "eq", trust: 1, vendor: "cisco", version: "9.0_0.07", }, { model: "catalyst 6000 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catalyst 4232-13", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(3\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.2\\(0.110\\)", }, { model: "catalyst 5000", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4840g", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2926t", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6000 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catalyst 6500 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "2.1\\(2\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(5a\\)csx", }, { model: "catalyst 5505", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(4a\\)", }, { model: "catalyst 8510msr", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(5\\)", }, { model: "catalyst 2900", scope: "eq", trust: 1, vendor: "cisco", version: "xl", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(2\\)", }, { model: "catalyst 7600 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "2.1\\(2\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(6\\)", }, { model: "catalyst 6500 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(1d\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(5\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(5\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(10\\)", }, { model: "catalyst 2820", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 3560", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4232", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 8510csr", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2980g-a", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(9\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.4\\(3\\)", }, { model: "catalyst 2950 lre", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(11\\)", }, { model: "catalyst 2926gs", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6000 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(12\\)", }, { model: "catalyst 3500 xl", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 7600 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catalyst 2980g", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 3750 metro", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(6\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.2\\(4\\)", }, { model: "catalyst 2900", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6624", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(2\\)", }, { model: "catalyst 7600 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "3.0\\(7\\)", }, { model: "catalyst 1900 series", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2926f", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6500 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catalyst 6500", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2901", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2940", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 3550", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4506", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 4507r", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.4", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(2\\)", }, { model: "catalyst 4224", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2950", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 2948", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catalyst 6608", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(1a\\)", }, { model: "catalyst 6500 ws-svc-nam-2", scope: "eq", trust: 1, vendor: "cisco", version: "2.2\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.1", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.3\\(4\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(2\\)csx", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(5\\)csx", }, { model: "catalyst 6000 ws-x6380-nam", scope: "eq", trust: 1, vendor: "cisco", version: "2.1\\(2\\)", }, { model: "catalyst 2955", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.4\\(2\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(6\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(1\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "4.5\\(3\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.3\\(1\\)csx", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(1b\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.2\\(0.111\\)", }, { model: "catalyst 6500 ws-svc-nam-1", scope: "eq", trust: 1, vendor: "cisco", version: "3.1\\(1a\\)", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(4b\\)", }, { model: "catalyst 4503", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "6.1\\(3\\)", }, { model: "catalyst 2920", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "catos", scope: "eq", trust: 1, vendor: "cisco", version: "5.5\\(19\\)", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "50006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "40006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "60005.5", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "60006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "40005.1", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "50005.1", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "40005.2", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "50004.5", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "40005.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(13)", }, { model: "catalyst sup720/msfc3", scope: "eq", trust: 0.3, vendor: "cisco", version: "7600", }, { model: "catalyst xu", scope: "eq", trust: 0.3, vendor: "cisco", version: "290012.0", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2955", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65097.6(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.2(0.110)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.6(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.1", }, { model: "catalyst 2948g-ge-tx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.3(4)", }, { model: "catalyst lre", scope: "eq", trust: 0.3, vendor: "cisco", version: "2950", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(1)", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "76003.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.3.5", }, { model: "catalyst metro", scope: "eq", trust: 0.3, vendor: "cisco", version: "3750", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "65003.1", }, { model: "catalyst sup720/msfc3", scope: "eq", trust: 0.3, vendor: "cisco", version: "6000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(3)", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(5)", }, { model: "catalyst 2926t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(10)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(9)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3200", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2902", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65007.6(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(9)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2948", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "65002.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "6500", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "6608", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "76003.1", }, { model: "catalyst sup5", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "28209.00.07", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65096.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "55005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2800", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40067.2(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(3)", }, { model: "catalyst ws-c2924m-xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(10)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(8)", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.2", }, { model: "catalyst sup4", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29005.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "55006.4", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4200", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2901", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29005.5(6)", }, { model: "catalyst 8510msr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2950", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "6624", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29004.5(12)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4506", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(5)", }, { model: "catalyst 4840g", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "39203.0(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2940", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(2)", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.2", }, { model: "catalyst 2980g-a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(1)", }, { model: "catalyst xu", scope: "eq", trust: 0.3, vendor: "cisco", version: "350012.0", }, { model: "catalyst 8540msr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.3(4)", }, { model: "catalyst 2980g", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "8500", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2926", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(1)", }, { model: "catalyst xl", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(2)", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.2(0.111)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65096.2(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.1(1)", }, { model: "catalyst 8510csr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29006.1(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4800", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(2)", }, { model: "catalyst sup2plus", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(11)", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "65003.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(12)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3550", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29004.5(11)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(13)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(5)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2920", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "5000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(7)", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "65002.2", }, { model: "catalyst pan", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.3", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.1(2.13)", }, { model: "catalyst sup3", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "55055.5(19)", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "76002.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(7)", }, { model: "catalyst sup2/msfc2", scope: "eq", trust: 0.3, vendor: "cisco", version: "7600", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(6)", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst 2926f", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "19009.00.07", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "76003.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4948", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40066.3(5)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "1200", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "5509", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(8)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "5505", }, { model: "catalyst 4510r", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst 2948g-l3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.1(2)", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "76002.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(4)", }, { model: "catalyst sup2/msfc2", scope: "eq", trust: 0.3, vendor: "cisco", version: "6000", }, { model: "catalyst sup2plus", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst access gateway switch", scope: "eq", trust: 0.3, vendor: "cisco", version: "4224", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3000", }, { model: "catalyst sup2plus ts", scope: "eq", trust: 0.3, vendor: "cisco", version: "4500", }, { model: "catalyst 2948g", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "65007.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(2)", }, { model: "catalyst 2926gs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst 2926gl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst sup3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst xl", scope: "eq", trust: 0.3, vendor: "cisco", version: "3500", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "1900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4232", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3560", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(13)", }, { model: "catalyst 4912g", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4232-13", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.3(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.6(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29006.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2970", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4500", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "76002.2", }, { model: "catalyst 4908g-l3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3750", }, { model: "catalyst sa6", scope: "eq", trust: 0.3, vendor: "cisco", version: "290011.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(1)", }, { model: "catalyst 4507r", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4503", }, { model: "catalyst 8540csr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2820", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5(10)", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "65002.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1.2", }, { model: "catalyst lre xl", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "65003.1", }, ], sources: [ { db: "BID", id: "15864", }, { db: "NVD", id: "CVE-2005-4258", }, { db: "CNNVD", id: "CNNVD-200512-297", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2005-4258", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Justin M. Wray", sources: [ { db: "CNNVD", id: "CNNVD-200512-297", }, ], trust: 0.6, }, cve: "CVE-2005-4258", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-15466", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2005-4258", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-200512-297", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-15466", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-15466", }, { db: "NVD", id: "CVE-2005-4258", }, { db: "CNNVD", id: "CNNVD-200512-297", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Multiple unspecified Cisco Catalyst switches are prone to a denial of service vulnerability. \nThese devices are susceptible to a remote denial of service vulnerability when handling TCP 'LanD' packets. \nThis issue allows remote attackers to crash affected devices, or to temporarily block further network routing functionality. This will deny further network services to legitimate users. \nAs no specific Cisco devices were identified by the reporter of this issue, all Cisco Catalyst devices have been marked as vulnerable. This BID will be updated as further information on affected packages is available", sources: [ { db: "NVD", id: "CVE-2005-4258", }, { db: "BID", id: "15864", }, { db: "VULHUB", id: "VHN-15466", }, ], trust: 1.26, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "BID", id: "15864", trust: 2, }, { db: "NVD", id: "CVE-2005-4258", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-200512-297", trust: 0.7, }, { db: "XF", id: "44543", trust: 0.6, }, { db: "VULHUB", id: "VHN-15466", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-15466", }, { db: "BID", id: "15864", }, { db: "NVD", id: "CVE-2005-4258", }, { db: "CNNVD", id: "CNNVD-200512-297", }, ], }, id: "VAR-200512-0215", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-15466", }, ], trust: 0.4056849, }, last_update_date: "2023-12-18T13:16:05.129000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2005-4258", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.securityfocus.com/bid/15864", }, { trust: 1.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543", }, { trust: 0.6, url: "http://xforce.iss.net/xforce/xfdb/44543", }, { trust: 0.3, url: "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html", }, { trust: 0.3, url: "http://www.cisco.com/warp/public/cc/pd/si/casi/ca3500xl/index.shtml", }, { trust: 0.3, url: "http://www.cisco.com/warp/public/707/advisory.html", }, { trust: 0.3, url: "/archive/1/419520", }, ], sources: [ { db: "VULHUB", id: "VHN-15466", }, { db: "BID", id: "15864", }, { db: "NVD", id: "CVE-2005-4258", }, { db: "CNNVD", id: "CNNVD-200512-297", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-15466", }, { db: "BID", id: "15864", }, { db: "NVD", id: "CVE-2005-4258", }, { db: "CNNVD", id: "CNNVD-200512-297", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2005-12-15T00:00:00", db: "VULHUB", id: "VHN-15466", }, { date: "2005-12-14T00:00:00", db: "BID", id: "15864", }, { date: "2005-12-15T11:03:00", db: "NVD", id: "CVE-2005-4258", }, { date: "2005-12-15T00:00:00", db: "CNNVD", id: "CNNVD-200512-297", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-07-20T00:00:00", db: "VULHUB", id: "VHN-15466", }, { date: "2005-12-14T00:00:00", db: "BID", id: "15864", }, { date: "2017-07-20T01:29:12.720000", db: "NVD", id: "CVE-2005-4258", }, { date: "2005-12-15T00:00:00", db: "CNNVD", id: "CNNVD-200512-297", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200512-297", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco Catalyst Switches LanD Packet denial of service vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-200512-297", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-200512-297", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.