var-200705-0565
Vulnerability from variot
The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used. The Cisco ASA and PIX firewalls contain an authentication bypass vulnerability. This vulnerability may allow a remote attacker to gain unauthorized access to the internal network or firewall. Cisco PIX and ASA are prone to a remote denial-of-service vulnerability because the software fails to properly handle DHCP packets in certain circumstances. Successfully exploiting this issue allows attackers with access to a LAN served by a vulnerable device to consume excessive memory resources. This will eventually cause the device to stop forwarding further packets, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCsh50277. PIX is a firewall device that provides policy enforcement, multi-vector attack protection and secure connection services for users and applications; Adaptive Security Appliance (ASA) is a modular platform that provides security and VPN services. If a DHCPACK message is received from multiple DHCP servers in response to a DHCPREQUEST or DHCPINFORM message from a DHCP client, it may result in a block memory consumption of 1550 bytes. Once the 1550-byte block memory is completely consumed, the device will start to drop packets, making it impossible to forward packets.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.
TITLE: Cisco PIX and ASA Denial of Service and Security Bypass
SECUNIA ADVISORY ID: SA25109
VERIFY ADVISORY: http://secunia.com/advisories/25109/
CRITICAL: Moderately critical
IMPACT: Security Bypass, DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ Cisco PIX 7.x http://secunia.com/product/6102/
DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).
1) An unspecified error exists when using the LDAP authentication mechanism, which can be exploited to bypass the authentication and gain access to the device or the network.
Successful exploitation requires that the device uses the Layer 2 Tunneling Protocol (L2TP) and is configured to use LDAP servers with another protocol other than PAP for authentication, or that the device offers remote management access (telnet, SSH, HTTP) and uses an LDAP AAA server for authentication.
2) An unspecified error when using VPN connections configured with password expiry can be exploited to cause a DoS.
Successful exploitation requires that the tunnel group is configured with password expiry. In order to exploit this in IPSec VPN connections, an attacker also needs to know the group name and group password.
3) A race condition within the processing of non-standard SSL sessions in the SSL VPN server of Cisco ASA appliances can be exploited to cause the device to reload.
Successful exploitation requires that clientless SSL is used.
Successful exploitation requires that devices are configured to use the DHCP relay agent.
SOLUTION: Apply updated software versions. Please see vendor advisories for details.
PROVIDED AND/OR DISCOVERED BY: 1-3) Reported by the vendor. 4) Lisa Sittler and Grant Deffenbaugh, CERT/CC.
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080833172.html http://www.cisco.com/en/US/products/products_applied_intelligence_response09186a008083316f.html
US-CERT VU#530057: http://www.kb.cert.org/vuls/id/530057
OTHER REFERENCES: US-CERT VU#210876: http://www.kb.cert.org/vuls/id/210876
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0565", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "pix", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2.2" }, { "model": "pix/asa", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.2" }, { "model": "adaptive security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.2" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.14)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.10)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(1)" }, { "model": "pix/asa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.15)" } ], "sources": [ { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "BID", "id": "23763" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:pix:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2461" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lisa SittlerGrant Deffenbaugh", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-062" } ], "trust": 0.6 }, "cve": "CVE-2007-2461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-2461", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-25823", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-2461", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#210876", "trust": 0.8, "value": "2.43" }, { "author": "CARNEGIE MELLON", "id": "VU#530057", "trust": 0.8, "value": "0.64" }, { "author": "CNNVD", "id": "CNNVD-200705-062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-25823", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "VULHUB", "id": "VHN-25823" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used. The Cisco ASA and PIX firewalls contain an authentication bypass vulnerability. This vulnerability may allow a remote attacker to gain unauthorized access to the internal network or firewall. Cisco PIX and ASA are prone to a remote denial-of-service vulnerability because the software fails to properly handle DHCP packets in certain circumstances. \nSuccessfully exploiting this issue allows attackers with access to a LAN served by a vulnerable device to consume excessive memory resources. This will eventually cause the device to stop forwarding further packets, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCsh50277. PIX is a firewall device that provides policy enforcement, multi-vector attack protection and secure connection services for users and applications; Adaptive Security Appliance (ASA) is a modular platform that provides security and VPN services. If a DHCPACK message is received from multiple DHCP servers in response to a DHCPREQUEST or DHCPINFORM message from a DHCP client, it may result in a block memory consumption of 1550 bytes. Once the 1550-byte block memory is completely consumed, the device will start to drop packets, making it impossible to forward packets. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nJoin the FREE BETA test of the Network Software Inspector (NSI)!\nhttp://secunia.com/network_software_inspector/\n\nThe NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\n----------------------------------------------------------------------\n\nTITLE:\nCisco PIX and ASA Denial of Service and Security Bypass\n\nSECUNIA ADVISORY ID:\nSA25109\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/25109/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco Adaptive Security Appliance (ASA) 7.x\nhttp://secunia.com/product/6115/\nCisco PIX 7.x\nhttp://secunia.com/product/6102/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Cisco PIX and ASA, which\ncan be exploited by malicious people to bypass certain security\nrestrictions or cause a DoS (Denial of Service). \n\n1) An unspecified error exists when using the LDAP authentication\nmechanism, which can be exploited to bypass the authentication and\ngain access to the device or the network. \n\nSuccessful exploitation requires that the device uses the Layer 2\nTunneling Protocol (L2TP) and is configured to use LDAP servers with\nanother protocol other than PAP for authentication, or that the\ndevice offers remote management access (telnet, SSH, HTTP) and uses\nan LDAP AAA server for authentication. \n\n2) An unspecified error when using VPN connections configured with\npassword expiry can be exploited to cause a DoS. \n\nSuccessful exploitation requires that the tunnel group is configured\nwith password expiry. In order to exploit this in IPSec VPN\nconnections, an attacker also needs to know the group name and group\npassword. \n\n3) A race condition within the processing of non-standard SSL\nsessions in the SSL VPN server of Cisco ASA appliances can be\nexploited to cause the device to reload. \n\nSuccessful exploitation requires that clientless SSL is used. \n\nSuccessful exploitation requires that devices are configured to use\nthe DHCP relay agent. \n\nSOLUTION:\nApply updated software versions. Please see vendor advisories for\ndetails. \n\nPROVIDED AND/OR DISCOVERED BY:\n1-3) Reported by the vendor. \n4) Lisa Sittler and Grant Deffenbaugh, CERT/CC. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml\n\nhttp://www.cisco.com/en/US/products/products_security_response09186a0080833172.html\nhttp://www.cisco.com/en/US/products/products_applied_intelligence_response09186a008083316f.html\n\nUS-CERT VU#530057:\nhttp://www.kb.cert.org/vuls/id/530057\n\nOTHER REFERENCES:\nUS-CERT VU#210876:\nhttp://www.kb.cert.org/vuls/id/210876\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "BID", "id": "23763" }, { "db": "VULHUB", "id": "VHN-25823" }, { "db": "PACKETSTORM", "id": "56436" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#530057", "trust": 3.7 }, { "db": "BID", "id": "23763", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2007-2461", "trust": 2.8 }, { "db": "SECUNIA", "id": "25109", "trust": 2.7 }, { "db": "SECTRACK", "id": "1018000", "trust": 2.5 }, { "db": "SECTRACK", "id": "1017999", "trust": 2.5 }, { "db": "OSVDB", "id": "35330", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-1635", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#210876", "trust": 0.9 }, { "db": "OSVDB", "id": "35331", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-000334", "trust": 0.8 }, { "db": "XF", "id": "34026", "trust": 0.6 }, { "db": "CISCO", "id": "20070502 DHCP RELAY AGENT VULNERABILITY IN CISCO PIX AND ASA APPLIANCES", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200705-062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-25823", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "56436", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "VULHUB", "id": "VHN-25823" }, { "db": "BID", "id": "23763" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "PACKETSTORM", "id": "56436" }, { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "id": "VAR-200705-0565", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-25823" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:35:24.192000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sr-20070502-pix", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000334" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/530057" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/23763" }, { "trust": 1.8, "url": "http://www.cisco.com/en/us/products/products_security_response09186a0080833172.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/35330" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1017999" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1018000" }, { "trust": 1.7, "url": "http://secunia.com/advisories/25109" }, { "trust": 1.6, "url": "http://www.cisco.com/en/us/products/ps6120/index.html" }, { "trust": 1.6, "url": "http://en.wikipedia.org/wiki/intrusion-prevention_system" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/1635" }, { "trust": 1.2, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/1635" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34026" }, { "trust": 0.9, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml" }, { "trust": 0.9, "url": "http://secunia.com/advisories/25109/" }, { "trust": 0.8, "url": "http://www.osvdb.org/35331" }, { "trust": 0.8, "url": "http://www.cisco.com/pcgi-bin/support/bugtool/onebug.pl?bugid=cscsh50277" }, { "trust": 0.8, "url": "http://www.cisco.com/en/us/products/ps6120/products_configuration_guide_chapter09186a0080636f31.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2461" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2461" }, { "trust": 0.8, "url": "http://securitytracker.com/id?1018000" }, { "trust": 0.8, "url": "http://securitytracker.com/id?1017999" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/34026" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/product/6102/" }, { "trust": 0.1, "url": "http://www.cisco.com/en/us/products/products_applied_intelligence_response09186a008083316f.html" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/210876" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/6115/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "VULHUB", "id": "VHN-25823" }, { "db": "BID", "id": "23763" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "PACKETSTORM", "id": "56436" }, { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#210876" }, { "db": "CERT/CC", "id": "VU#530057" }, { "db": "VULHUB", "id": "VHN-25823" }, { "db": "BID", "id": "23763" }, { "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "db": "PACKETSTORM", "id": "56436" }, { "db": "NVD", "id": "CVE-2007-2461" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-02T00:00:00", "db": "CERT/CC", "id": "VU#210876" }, { "date": "2007-05-02T00:00:00", "db": "CERT/CC", "id": "VU#530057" }, { "date": "2007-05-02T00:00:00", "db": "VULHUB", "id": "VHN-25823" }, { "date": "2007-05-02T00:00:00", "db": "BID", "id": "23763" }, { "date": "2007-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "date": "2007-05-04T05:48:13", "db": "PACKETSTORM", "id": "56436" }, { "date": "2007-05-02T22:19:00", "db": "NVD", "id": "CVE-2007-2461" }, { "date": "2007-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-06-15T00:00:00", "db": "CERT/CC", "id": "VU#210876" }, { "date": "2007-05-03T00:00:00", "db": "CERT/CC", "id": "VU#530057" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-25823" }, { "date": "2015-05-07T17:39:00", "db": "BID", "id": "23763" }, { "date": "2007-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000334" }, { "date": "2023-08-11T19:02:04.560000", "db": "NVD", "id": "CVE-2007-2461" }, { "date": "2007-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco PIX/ASA DHCP Relay Remote Denial of Service Vulnerability", "sources": [ { "db": "BID", "id": "23763" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "23763" }, { "db": "CNNVD", "id": "CNNVD-200705-062" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.