var-200702-0342
Vulnerability from variot

Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. According to Cisco Systems information, advanced HTTP The inspection function is disabled by default and is "inspect http" (HTTP Inspection ) Has been reported to be unaffected.Crafted by a third party HTTP Processing the request causes the device to interfere with service operation (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. The Cisco PIX/ASA and Firewall Services Module (FWSM) provide firewall services with stateful packet filtering and deep packet inspection. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability.

Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/

TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service

SECUNIA ADVISORY ID: SA24160

VERIFY ADVISORY: http://secunia.com/advisories/24160/

CRITICAL: Moderately critical

IMPACT: Privilege escalation, DoS

WHERE:

From remote

OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/

DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service).

1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled.

2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default).

3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled.

4) An unspecified error within the "LOCAL" authentication method can be exploited to gain escalated privileges. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0.

SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

.

Successful exploitation requires that "SIP fixup" is enabled, which is the default setting.

2) A security issue when manipulating ACLs (Access Control Lists) that make use of object groups can corrupt ACLs, resulting in ACEs (Access Control Entries) being skipped or not evaluated in order, which can be exploited to bypass certain security restrictions.

Note: Only an administrative user can change ACLs. Additionally, this does not affected devices which are reloaded after ACLs have been manipulated

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0342",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "firewall services module",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "pix firewall software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.1"
      },
      {
        "model": "firewall services module",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "asa 5500",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.1"
      },
      {
        "model": "pix firewall software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0"
      },
      {
        "model": "asa 5500",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0"
      },
      {
        "model": "firewall services module",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.x"
      },
      {
        "model": "pix/asa",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "7.0"
      },
      {
        "model": "pix/asa",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "7.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "7.1"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "7.0"
      },
      {
        "model": "pix/asa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.2.2"
      },
      {
        "model": "pix/asa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.2(2.10)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Security bulletin",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0962",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-0962",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-24324",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-0962",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-315",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24324",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. According to Cisco Systems information, advanced HTTP The inspection function is disabled by default and is \"inspect http\" (HTTP Inspection ) Has been reported to be unaffected.Crafted by a third party HTTP Processing the request causes the device to interfere with service operation (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability. \nExploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. The Cisco PIX/ASA and Firewall Services Module (FWSM) provide firewall services with stateful packet filtering and deep packet inspection. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco PIX and ASA Privilege Escalation and Denial of Service\n\nSECUNIA ADVISORY ID:\nSA24160\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24160/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nPrivilege escalation, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco PIX 7.x\nhttp://secunia.com/product/6102/\nCisco Adaptive Security Appliance (ASA) 7.x\nhttp://secunia.com/product/6115/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Cisco PIX and ASA, which\ncan be exploited by malicious users to gain escalated privileges and\nby malicious people to cause a DoS (Denial of Service). \n\n1) An unspecified error exists within the enhanced HTTP inspection\nfeature. This can be exploited to crash the device via malformed HTTP\nrequests, but requires that enhanced HTTP inspection is enabled. \n\n2) An unspecified error exists within the SIP packet inspection. This\ncan be exploited to crash the device by sending specially crafted SIP\npackets, but requires that \"inspect\" is enabled (it is disabled by\ndefault). \n\n3) An unspecified error exists within the TCP-based protocol\ninspection. This can be exploited to crash the device via malformed\npackets, but requires that inspection of TCP-based protocols (e.g. \nFTP or HTTP) is enabled. \n\n4) An unspecified error within the \"LOCAL\" authentication method can\nbe exploited to gain escalated privileges. Successful exploitation\nallows gaining privilege level 15 and changing the complete\nconfiguration of the device, but requires that the attacker can\nauthenticate to the device and that he is defined in the local\ndatabase with privilege level 0. \n\nSOLUTION:\nApply updated versions. See the vendor advisory for a patch matrix. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nSuccessful exploitation requires that \"SIP fixup\" is enabled, which\nis the default setting. \n\n2) A security issue when manipulating ACLs (Access Control Lists)\nthat make use of object groups can corrupt ACLs, resulting in ACEs\n(Access Control Entries) being skipped or not evaluated in order,\nwhich can be exploited to bypass certain security restrictions. \n\nNote: Only an administrative user can change ACLs. Additionally, this\ndoes not affected devices which are reloaded after ACLs have been\nmanipulated",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54443"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-0962",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "24160",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "22561",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "22562",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "24180",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "33055",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1017652",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1017651",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0608",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20070214 MULTIPLE VULNERABILITIES IN FIREWALL SERVICES MODULE",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "32486",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-24324",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54452",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54443",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54443"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "id": "VAR-200702-0342",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:12:46.565000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20070214-pix",
        "trust": 0.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml"
      },
      {
        "title": "cisco-sa-20070214-fwsm",
        "trust": 0.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/22561"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/22562"
      },
      {
        "trust": 1.7,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2481.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/33055"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1017651"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1017652"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24160"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24180"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/0608"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/0608"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/24160/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0962"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0962"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/32486"
      },
      {
        "trust": 0.4,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/460079"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6102/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6115/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5088/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24180/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54443"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54443"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "date": "2007-02-14T00:00:00",
        "db": "BID",
        "id": "22562"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "date": "2007-02-16T06:49:41",
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "date": "2007-02-16T06:49:41",
        "db": "PACKETSTORM",
        "id": "54443"
      },
      {
        "date": "2007-02-16T00:28:00",
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "date": "2007-02-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24324"
      },
      {
        "date": "2016-07-06T14:39:00",
        "db": "BID",
        "id": "22562"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      },
      {
        "date": "2018-10-30T16:25:19.340000",
        "db": "NVD",
        "id": "CVE-2007-0962"
      },
      {
        "date": "2007-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco PIX/ASA and  FWSM Rogue  HTTP Service disruption due to traffic  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000142"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-315"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.