VAR-200601-0023
Vulnerability from variot - Updated: 2023-12-18 13:58Cisco VPN 3000 series concentrators running software 4.7.0 through 4.7.2.A allow remote attackers to cause a denial of service (device reload or user disconnect) via a crafted HTTP packet. A successful attack can cause the device to hang, completely denying further service to legitimate users. Cisco has documented this issue as Bug IDs CSCsb77324 and CSCsd26340.
The vulnerability is caused due to an error when processing HTTP packets.
Successful exploitation requires that the HTTP service is enabled (default setting).
The vulnerability has been reported in software versions 4.7.0 through 4.7.2.A (including version 4.7REL). Software versions prior to 4.7.x are not affected.
SOLUTION: Update to software version 4.7.2.B or later. http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des
Disable the HTTP service.
PROVIDED AND/OR DISCOVERED BY: Discussed at the Schmoocon security conference.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200601-0023",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.7.1.f"
},
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.7.2.a"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.2.a"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.1"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7\\(rel\\)"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.2"
},
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.2"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7"
},
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7\\(rel\\)"
},
{
"model": "vpn 3000 concentrator series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.1.f"
},
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.7.1"
},
{
"model": "vpn 3005 concentrator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3015 concentrator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3020 concentrator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3030 concentator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3080 concentrator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4.7.0 to 4.7.2.a"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7\\(rel\\)"
},
{
"model": "vpn 3080 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7.2.a"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7.2"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7.1"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7.1.f"
},
{
"model": "vpn 3015 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7.2"
},
{
"model": "vpn 3060 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7"
},
{
"model": "vpn 3005 concentrator",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7.2"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30604.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7.2"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7.2"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7.2"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7"
},
{
"model": "vpn concentrator a",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7.2"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7.2"
},
{
"model": "vpn concentrator f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7.1"
},
{
"model": "vpn concentrator",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7"
},
{
"model": "vpn concentrator rel",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7"
},
{
"model": "vpn concentrator f",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.7.2"
},
{
"model": "vpn concentrator l",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30804.1.7"
},
{
"model": "vpn concentrator f",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.7.2"
},
{
"model": "vpn concentrator l",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30304.1.7"
},
{
"model": "vpn concentrator f",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.7.2"
},
{
"model": "vpn concentrator l",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30204.1.7"
},
{
"model": "vpn concentrator f",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.7.2"
},
{
"model": "vpn concentrator l",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30154.1.7"
},
{
"model": "vpn concentrator f",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.7.2"
},
{
"model": "vpn concentrator l",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "30054.1.7"
}
],
"sources": [
{
"db": "BID",
"id": "16394"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1.f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2.a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7\\(rel\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7\\(rel\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-0483"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Eldon Sprickerhoff \u003celdons@eSentire.com\u003e.",
"sources": [
{
"db": "BID",
"id": "16394"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
],
"trust": 0.9
},
"cve": "CVE-2006-0483",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2006-0483",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-16591",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-0483",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200601-387",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-16591",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-16591"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco VPN 3000 series concentrators running software 4.7.0 through 4.7.2.A allow remote attackers to cause a denial of service (device reload or user disconnect) via a crafted HTTP packet. \nA successful attack can cause the device to hang, completely denying further service to legitimate users. \nCisco has documented this issue as Bug IDs CSCsb77324 and CSCsd26340. \n\nThe vulnerability is caused due to an error when processing HTTP\npackets. \n\nSuccessful exploitation requires that the HTTP service is enabled\n(default setting). \n\nThe vulnerability has been reported in software versions 4.7.0\nthrough 4.7.2.A (including version 4.7REL). Software versions prior\nto 4.7.x are not affected. \n\nSOLUTION:\nUpdate to software version 4.7.2.B or later. \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des\n\nDisable the HTTP service. \n\nPROVIDED AND/OR DISCOVERED BY:\nDiscussed at the Schmoocon security conference. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "BID",
"id": "16394"
},
{
"db": "VULHUB",
"id": "VHN-16591"
},
{
"db": "PACKETSTORM",
"id": "43446"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2006-0483",
"trust": 2.5
},
{
"db": "BID",
"id": "16394",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "18629",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2006-0346",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1015546",
"trust": 1.7
},
{
"db": "SREASON",
"id": "375",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "22754",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20060126 CISCO VPN 3000 CONCENTRATOR VULNERABLE TO CRAFTED HTTP ATTACK",
"trust": 0.6
},
{
"db": "XF",
"id": "24330",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-16591",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "43446",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-16591"
},
{
"db": "BID",
"id": "16394"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "PACKETSTORM",
"id": "43446"
},
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"id": "VAR-200601-0023",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-16591"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:58:30.587000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20060126-vpn.shtml",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml"
},
{
"title": "18629",
"trust": 0.8,
"url": "http://secunia.com/advisories/18629"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-0483"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/16394"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/22754"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1015546"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/18629"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/375"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/0346"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24330"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0483"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-0483"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/0346"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/24330"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html"
},
{
"trust": 0.3,
"url": "http://www.esentire.com/news/vuln-cisco-vpn.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/90/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/18629/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-16591"
},
{
"db": "BID",
"id": "16394"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "PACKETSTORM",
"id": "43446"
},
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-16591"
},
{
"db": "BID",
"id": "16394"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"db": "PACKETSTORM",
"id": "43446"
},
{
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-01-31T00:00:00",
"db": "VULHUB",
"id": "VHN-16591"
},
{
"date": "2006-01-26T00:00:00",
"db": "BID",
"id": "16394"
},
{
"date": "2014-03-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"date": "2006-01-27T18:55:10",
"db": "PACKETSTORM",
"id": "43446"
},
{
"date": "2006-01-31T20:03:00",
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"date": "2006-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-16591"
},
{
"date": "2006-04-26T22:41:00",
"db": "BID",
"id": "16394"
},
{
"date": "2014-03-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-003856"
},
{
"date": "2018-10-30T16:26:19.653000",
"db": "NVD",
"id": "CVE-2006-0483"
},
{
"date": "2006-02-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco VPN 3000 series concentrator Service disruption in software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-003856"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200601-387"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.