var-200601-0023
Vulnerability from variot
Cisco VPN 3000 series concentrators running software 4.7.0 through 4.7.2.A allow remote attackers to cause a denial of service (device reload or user disconnect) via a crafted HTTP packet. A successful attack can cause the device to hang, completely denying further service to legitimate users. Cisco has documented this issue as Bug IDs CSCsb77324 and CSCsd26340.
The vulnerability is caused due to an error when processing HTTP packets.
Successful exploitation requires that the HTTP service is enabled (default setting).
The vulnerability has been reported in software versions 4.7.0 through 4.7.2.A (including version 4.7REL). Software versions prior to 4.7.x are not affected.
SOLUTION: Update to software version 4.7.2.B or later. http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des
Disable the HTTP service.
PROVIDED AND/OR DISCOVERED BY: Discussed at the Schmoocon security conference.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200601-0023", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vpn 3030 concentator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.7.1.f" }, { "model": "vpn 3030 concentator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.7.2.a" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.2.a" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.1" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7\\(rel\\)" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.2" }, { "model": "vpn 3030 concentator", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.2" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7" }, { "model": "vpn 3030 concentator", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7\\(rel\\)" }, { "model": "vpn 3000 concentrator series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.1.f" }, { "model": "vpn 3030 concentator", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.7.1" }, { "model": "vpn 3005 concentrator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3015 concentrator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3020 concentrator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3030 concentator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3080 concentrator", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.7.0 to 4.7.2.a" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7\\(rel\\)" }, { "model": "vpn 3080 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7.2.a" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7.2" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7.1" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7.1.f" }, { "model": "vpn 3015 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7.2" }, { "model": "vpn 3060 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7" }, { "model": "vpn 3005 concentrator", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30804.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30804.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30804.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30804.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30804.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7.2" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30604.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7.2" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30304.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7.2" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30204.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7.2" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30154.7" }, { "model": "vpn concentrator a", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7.2" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7.2" }, { "model": "vpn concentrator f", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7.1" }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7" }, { "model": "vpn concentrator rel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30054.7" }, { "model": "vpn concentrator f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30804.7.2" }, { "model": "vpn concentrator l", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30804.1.7" }, { "model": "vpn concentrator f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30304.7.2" }, { "model": "vpn concentrator l", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30304.1.7" }, { "model": "vpn concentrator f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30204.7.2" }, { "model": "vpn concentrator l", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30204.1.7" }, { "model": "vpn concentrator f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30154.7.2" }, { "model": "vpn concentrator l", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30154.1.7" }, { "model": "vpn concentrator f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30054.7.2" }, { "model": "vpn concentrator l", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30054.1.7" } ], "sources": [ { "db": "BID", "id": "16394" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1.f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2.a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7\\(rel\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7\\(rel\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-0483" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Eldon Sprickerhoff \u003celdons@eSentire.com\u003e.", "sources": [ { "db": "BID", "id": "16394" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ], "trust": 0.9 }, "cve": "CVE-2006-0483", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2006-0483", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-16591", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-0483", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200601-387", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-16591", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-16591" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco VPN 3000 series concentrators running software 4.7.0 through 4.7.2.A allow remote attackers to cause a denial of service (device reload or user disconnect) via a crafted HTTP packet. \nA successful attack can cause the device to hang, completely denying further service to legitimate users. \nCisco has documented this issue as Bug IDs CSCsb77324 and CSCsd26340. \n\nThe vulnerability is caused due to an error when processing HTTP\npackets. \n\nSuccessful exploitation requires that the HTTP service is enabled\n(default setting). \n\nThe vulnerability has been reported in software versions 4.7.0\nthrough 4.7.2.A (including version 4.7REL). Software versions prior\nto 4.7.x are not affected. \n\nSOLUTION:\nUpdate to software version 4.7.2.B or later. \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des\n\nDisable the HTTP service. \n\nPROVIDED AND/OR DISCOVERED BY:\nDiscussed at the Schmoocon security conference. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "BID", "id": "16394" }, { "db": "VULHUB", "id": "VHN-16591" }, { "db": "PACKETSTORM", "id": "43446" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-0483", "trust": 2.5 }, { "db": "BID", "id": "16394", "trust": 2.0 }, { "db": "SECUNIA", "id": "18629", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2006-0346", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015546", "trust": 1.7 }, { "db": "SREASON", "id": "375", "trust": 1.7 }, { "db": "OSVDB", "id": "22754", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-003856", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200601-387", "trust": 0.7 }, { "db": "CISCO", "id": "20060126 CISCO VPN 3000 CONCENTRATOR VULNERABLE TO CRAFTED HTTP ATTACK", "trust": 0.6 }, { "db": "XF", "id": "24330", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-16591", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "43446", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-16591" }, { "db": "BID", "id": "16394" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "PACKETSTORM", "id": "43446" }, { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "id": "VAR-200601-0023", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-16591" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:58:30.587000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20060126-vpn.shtml", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml" }, { "title": "18629", "trust": 0.8, "url": "http://secunia.com/advisories/18629" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003856" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-0483" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/16394" }, { "trust": 1.7, "url": "http://www.osvdb.org/22754" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015546" }, { "trust": 1.7, "url": "http://secunia.com/advisories/18629" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/375" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/0346" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24330" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0483" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-0483" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/0346" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/24330" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html" }, { "trust": 0.3, "url": "http://www.esentire.com/news/vuln-cisco-vpn.html" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/90/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/18629/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-16591" }, { "db": "BID", "id": "16394" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "PACKETSTORM", "id": "43446" }, { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-16591" }, { "db": "BID", "id": "16394" }, { "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "db": "PACKETSTORM", "id": "43446" }, { "db": "NVD", "id": "CVE-2006-0483" }, { "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-01-31T00:00:00", "db": "VULHUB", "id": "VHN-16591" }, { "date": "2006-01-26T00:00:00", "db": "BID", "id": "16394" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "date": "2006-01-27T18:55:10", "db": "PACKETSTORM", "id": "43446" }, { "date": "2006-01-31T20:03:00", "db": "NVD", "id": "CVE-2006-0483" }, { "date": "2006-01-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-16591" }, { "date": "2006-04-26T22:41:00", "db": "BID", "id": "16394" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003856" }, { "date": "2018-10-30T16:26:19.653000", "db": "NVD", "id": "CVE-2006-0483" }, { "date": "2006-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200601-387" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200601-387" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco VPN 3000 series concentrator Service disruption in software (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003856" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200601-387" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.