var-200709-0062
Vulnerability from variot

Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. Attackers may leverage this issue to access a device from an unauthorized remote location; this may aid in further attacks.

Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/

TITLE: Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness

SECUNIA ADVISORY ID: SA26988

VERIFY ADVISORY: http://secunia.com/advisories/26988/

CRITICAL: Not critical

IMPACT: Security Bypass

WHERE:

From local network

OPERATING SYSTEM: Cisco 7600 Series 12.x http://secunia.com/product/15865/ Cisco Catalyst 6500 Series 12.x http://secunia.com/product/15864/

DESCRIPTION: A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions.

The problem is that packets destined for the 127.0.0.0/8 network may be received and processed by e.g. the Supervisor module or Multilayer Switch Feature Card (MSFC). This can be exploited to e.g. bypass existing access control lists.

Successful exploitation requires that systems are running Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the MSFC) or Native Mode (IOS Software on both the Supervisor Engine and the MSFC).

The weakness is reported in all software versions on Cisco Catalyst 6500 and Cisco 7600 series prior to 12.2(33)SXH.

SOLUTION: Update to 12.2(33)SXH.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Lee E. Rian.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200709-0062",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "catalyst 6500 ws-svc-nam-2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2\\(1a\\)"
      },
      {
        "model": "catalyst 6500 ws-svc-nam-1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2\\(1a\\)"
      },
      {
        "model": "catalyst 6500 ws-x6380-nam",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1\\(2\\)"
      },
      {
        "model": "catalyst 6500 ws-svc-nam-1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catalyst 7600 ws-svc-nam-1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2\\(1a\\)"
      },
      {
        "model": "catalyst 6500 ws-x6380-nam",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7.6\\(1\\)"
      },
      {
        "model": "catalyst 7600 ws-svc-nam-2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4\\(1\\)"
      },
      {
        "model": "catalyst 6500 ws-svc-nam-2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catalyst 6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "catalyst 7600 ws-x6380-nam",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1\\(2\\)"
      },
      {
        "model": "catalyst 7600 ws-x6380-nam",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7.5\\(1\\)"
      },
      {
        "model": "catalyst 7600 ws-svc-nam-1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1\\(1a\\)"
      },
      {
        "model": "catalyst 7600 ws-svc-nam-2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.2\\(1a\\)"
      },
      {
        "model": "catalyst 7600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "7600 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 6500 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 6500",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 7600",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 7600",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "sup2_msfc2"
      },
      {
        "model": "catalyst 7600",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "sup720_msfc3"
      },
      {
        "model": "catalyst ws-x6380-nam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76003.1"
      },
      {
        "model": "catalyst ws-svc-nam-2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76003.1"
      },
      {
        "model": "catalyst ws-svc-nam-1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76003.1"
      },
      {
        "model": "catalyst ws-svc-nam-2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76002.2"
      },
      {
        "model": "catalyst ws-svc-nam-1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76002.2"
      },
      {
        "model": "catalyst ws-x6380-nam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "76002.1"
      },
      {
        "model": "catalyst sup720/msfc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7600"
      },
      {
        "model": "catalyst sup2/msfc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7600"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65007.6(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65007.5(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65005.4.1"
      },
      {
        "model": "catalyst ws-x6380-nam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65003.1"
      },
      {
        "model": "catalyst ws-svc-nam-2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65003.1"
      },
      {
        "model": "catalyst ws-svc-nam-1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65003.1"
      },
      {
        "model": "catalyst ws-svc-nam-2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65002.2"
      },
      {
        "model": "catalyst ws-svc-nam-1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65002.2"
      },
      {
        "model": "catalyst ws-x6380-nam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "65002.1"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6500"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7600"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "25822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Lee E. Rian",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-5134",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2007-5134",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-28496",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-5134",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200709-409",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-28496",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. \nAttackers may leverage this issue to access a device from an unauthorized remote location; this may aid in further attacks. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,700 different Windows applications. \n\nRequest your account, the Secunia Network Software Inspector (NSI):\nhttp://secunia.com/network_software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback\nAddress Weakness\n\nSECUNIA ADVISORY ID:\nSA26988\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26988/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nCisco 7600 Series 12.x\nhttp://secunia.com/product/15865/\nCisco Catalyst 6500 Series 12.x\nhttp://secunia.com/product/15864/\n\nDESCRIPTION:\nA weakness has been reported in Cisco Catalyst 6500 and Cisco 7600\nseries devices, which can be exploited by malicious people to bypass\ncertain security restrictions. \n\nThe problem is that packets destined for the 127.0.0.0/8 network may\nbe received and processed by e.g. the Supervisor module or Multilayer\nSwitch Feature Card (MSFC). This can be exploited to e.g. bypass\nexisting access control lists. \n\nSuccessful exploitation requires that systems are running Hybrid Mode\n(Catalyst OS (CatOS) software on the Supervisor Engine and IOS\nSoftware on the MSFC) or Native Mode (IOS Software on both the\nSupervisor Engine and the MSFC). \n\nThe weakness is reported in all software versions on Cisco Catalyst\n6500 and Cisco 7600 series prior to 12.2(33)SXH. \n\nSOLUTION:\nUpdate to 12.2(33)SXH. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Lee E. Rian. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "BID",
        "id": "25822"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "PACKETSTORM",
        "id": "59638"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "25822",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "26988",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1018742",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1018743",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-3276",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "36826",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717",
        "trust": 0.8
      },
      {
        "db": "FULLDISC",
        "id": "20070927 RE: CAT6500 ACCESSIBLE VIA 127.0.0.X LOOPBACK ADDRESSES",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20070926 CATALYST 6500 AND CISCO 7600 SERIES DEVICES ACCESSIBLE VIA LOOPBACK ADDRESS",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-28496",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "59638",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "BID",
        "id": "25822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "PACKETSTORM",
        "id": "59638"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "id": "VAR-200709-0062",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      }
    ],
    "trust": 0.4056849
  },
  "last_update_date": "2023-12-18T13:10:22.350000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sr-20070926-lb",
        "trust": 0.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/25822"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1018742"
      },
      {
        "trust": 2.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2007/sep/0573.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1018743"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26988"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/3276"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/36826"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/3276"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/26988/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5134"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5134"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/hw/switches/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/15865/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/15864/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "BID",
        "id": "25822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "PACKETSTORM",
        "id": "59638"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "db": "BID",
        "id": "25822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "db": "PACKETSTORM",
        "id": "59638"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-09-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "date": "2007-09-26T00:00:00",
        "db": "BID",
        "id": "25822"
      },
      {
        "date": "2007-10-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "date": "2007-09-27T23:54:21",
        "db": "PACKETSTORM",
        "id": "59638"
      },
      {
        "date": "2007-09-27T19:17:00",
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "date": "2007-09-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28496"
      },
      {
        "date": "2015-05-07T17:35:00",
        "db": "BID",
        "id": "25822"
      },
      {
        "date": "2007-10-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      },
      {
        "date": "2017-07-29T01:33:25.053000",
        "db": "NVD",
        "id": "CVE-2007-5134"
      },
      {
        "date": "2007-10-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Catalyst 6500 and  Cisco 7600 Loopback in the series  IP Address restriction bypass vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000717"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200709-409"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.