var-201803-1384
Vulnerability from variot
Multiple Buffer Overflow vulnerabilities in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCuo17183, CSCvd73487. Cisco IOS , Cisco IOS XE ,and Cisco IOS XR The software contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuo17183 and CSCvd73487 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS Software, IOSXE Software, and IOSXR Software are operating systems developed by Cisco Systems for their network devices. LinkLayerDiscoveryProtocol (LLDP) subsystem is one of the link layer discovery protocol subsystems. The vulnerability stems from a program failing to properly handle malformed LLDP messages. An attacker could exploit the vulnerability by submitting an LLDP protocol data unit to cause a denial of service or to execute arbitrary code with elevated privileges. Cisco IOS/IOS XE/IOS XR Software are prone to multiple remote code-execution and multiple format-string vulnerabilities. Failed exploit attempts may result in a denial of service conditions. These issues are being tracked by Cisco Bug ID' s CSCuo17183, CSCvd73487 and CSCvd73664
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": null, "trust": 1.7, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2.0.base" }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2.0.base" }, { "model": "ios xr", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2.0.base" }, { "model": "ios xe", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "ios", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.2" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.1" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.0" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.0" }, { "model": "ios xe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios 15.4 m4.1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios xr software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "BID", "id": "103564" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:5.2.0.base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0167" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco.", "sources": [ { "db": "BID", "id": "103564" } ], "trust": 0.3 }, "cve": "CVE-2018-0167", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0167", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2018-08183", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-118369", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0167", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0167", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-08183", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-1025", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118369", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-0167", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULHUB", "id": "VHN-118369" }, { "db": "VULMON", "id": "CVE-2018-0167" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Buffer Overflow vulnerabilities in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCuo17183, CSCvd73487. Cisco IOS , Cisco IOS XE ,and Cisco IOS XR The software contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuo17183 and CSCvd73487 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS Software, IOSXE Software, and IOSXR Software are operating systems developed by Cisco Systems for their network devices. LinkLayerDiscoveryProtocol (LLDP) subsystem is one of the link layer discovery protocol subsystems. The vulnerability stems from a program failing to properly handle malformed LLDP messages. An attacker could exploit the vulnerability by submitting an LLDP protocol data unit to cause a denial of service or to execute arbitrary code with elevated privileges. Cisco IOS/IOS XE/IOS XR Software are prone to multiple remote code-execution and multiple format-string vulnerabilities. Failed exploit attempts may result in a denial of service conditions. \nThese issues are being tracked by Cisco Bug ID\u0027 s CSCuo17183, CSCvd73487 and CSCvd73664", "sources": [ { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "BID", "id": "103564" }, { "db": "VULHUB", "id": "VHN-118369" }, { "db": "VULMON", "id": "CVE-2018-0167" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0167", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-18-107-04", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-18-107-03", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-18-107-05", "trust": 2.6 }, { "db": "BID", "id": "103564", "trust": 2.1 }, { "db": "SECTRACK", "id": "1040586", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2018-003569", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-1025", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-08183", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2018.0912.2", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-0167", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULHUB", "id": "VHN-118369" }, { "db": "VULMON", "id": "CVE-2018-0167" }, { "db": "BID", "id": "103564" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "id": "VAR-201803-1384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULHUB", "id": "VHN-118369" } ], "trust": 1.25286753 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" } ] }, "last_update_date": "2023-12-26T22:55:17.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180328-lldp", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-lldp" }, { "title": "Patch for Cisco IOS/IOSXE/IOSXRSoftwareLinkLayerDiscoveryProtocol Subsystem Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/126857" }, { "title": "Cisco IOS Software , IOS XE Software and IOS XR Software Link Layer Discovery Protocol Fixes for Subsystem Buffer Error Vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=79493" }, { "title": "Cisco: Cisco IOS, IOS XE, and IOS XR Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180328-lldp" }, { "title": "Known Exploited Vulnerabilities Detector", "trust": 0.1, "url": "https://github.com/ostorlab/kev " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULMON", "id": "CVE-2018-0167" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118369" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-lldp" }, { "trust": 2.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-03" }, { "trust": 2.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-04" }, { "trust": 2.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-107-05" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/103564" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1040586" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0167" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0167" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2018.0912.2" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/ostorlab/kev" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULHUB", "id": "VHN-118369" }, { "db": "VULMON", "id": "CVE-2018-0167" }, { "db": "BID", "id": "103564" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-08183" }, { "db": "VULHUB", "id": "VHN-118369" }, { "db": "VULMON", "id": "CVE-2018-0167" }, { "db": "BID", "id": "103564" }, { "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "db": "NVD", "id": "CVE-2018-0167" }, { "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-08183" }, { "date": "2018-03-28T00:00:00", "db": "VULHUB", "id": "VHN-118369" }, { "date": "2018-03-28T00:00:00", "db": "VULMON", "id": "CVE-2018-0167" }, { "date": "2018-03-28T00:00:00", "db": "BID", "id": "103564" }, { "date": "2018-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "date": "2018-03-28T22:29:00.907000", "db": "NVD", "id": "CVE-2018-0167" }, { "date": "2018-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-08183" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118369" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2018-0167" }, { "date": "2018-03-28T00:00:00", "db": "BID", "id": "103564" }, { "date": "2018-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003569" }, { "date": "2019-10-09T23:31:22.237000", "db": "NVD", "id": "CVE-2018-0167" }, { "date": "2023-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1025" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1025" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco IOS Product buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003569" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1025" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.