Vulnerabilites related to cisco - catos
CVE-2003-1002 (GCVE-0-2003-1002)
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-09-16 18:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-12-17T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1002", "datePublished": "2003-12-17T05:00:00Z", "dateReserved": "2003-12-16T00:00:00Z", "dateUpdated": "2024-09-16T18:56:00.738Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0267 (GCVE-0-2000-0267)
Vulnerability from cvelistv5
Published
2000-06-02 04:00
Modified
2024-08-08 05:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:20.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1122", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1122" }, { "name": "1288", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1288" }, { "name": "20000419 Cisco Catalyst Enable Password Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1122", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1122" }, { "name": "1288", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1288" }, { "name": "20000419 Cisco Catalyst Enable Password Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1122", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1122" }, { "name": "1288", "refsource": "OSVDB", "url": "http://www.osvdb.org/1288" }, { "name": "20000419 Cisco Catalyst Enable Password Bypass Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0267", "datePublished": "2000-06-02T04:00:00", "dateReserved": "2000-04-26T00:00:00", "dateUpdated": "2024-08-08T05:14:20.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1071 (GCVE-0-2001-1071)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 04:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:44:07.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1969", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1969" }, { "name": "cisco-ios-cdp-dos(7242)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242" }, { "name": "VU#139491", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/139491" }, { "name": "20011009 Cisco CDP attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/219257" }, { "name": "3412", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3412" }, { "name": "20011009 Cisco Systems - Vulnerability in CDP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/219305" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1969", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1969" }, { "name": "cisco-ios-cdp-dos(7242)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242" }, { "name": "VU#139491", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/139491" }, { "name": "20011009 Cisco CDP attacks", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/219257" }, { "name": "3412", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3412" }, { "name": "20011009 Cisco Systems - Vulnerability in CDP", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/219305" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1969", "refsource": "OSVDB", "url": "http://www.osvdb.org/1969" }, { "name": "cisco-ios-cdp-dos(7242)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242" }, { "name": "VU#139491", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/139491" }, { "name": "20011009 Cisco CDP attacks", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/219257" }, { "name": "3412", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3412" }, { "name": "20011009 Cisco Systems - Vulnerability in CDP", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/219305" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1071", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:44:07.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4963 (GCVE-0-2008-4963)
Vulnerability from cvelistv5
Published
2008-11-06 11:00
Modified
2024-08-07 10:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:28.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32573" }, { "name": "20081105 Cisco VLAN Trunking Protocol Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html" }, { "name": "1021143", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021143" }, { "name": "1021144", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021144" }, { "name": "cisco-ios-catos-vtp-dos(46346)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346" }, { "name": "32120", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32120" }, { "name": "49601", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49601" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "32573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32573" }, { "name": "20081105 Cisco VLAN Trunking Protocol Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html" }, { "name": "1021143", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021143" }, { "name": "1021144", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021144" }, { "name": "cisco-ios-catos-vtp-dos(46346)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346" }, { "name": "32120", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32120" }, { "name": "49601", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49601" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32573", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32573" }, { "name": "20081105 Cisco VLAN Trunking Protocol Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html" }, { "name": "1021143", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021143" }, { "name": "1021144", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021144" }, { "name": "cisco-ios-catos-vtp-dos(46346)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346" }, { "name": "32120", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32120" }, { "name": "49601", "refsource": "OSVDB", "url": "http://osvdb.org/49601" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4963", "datePublished": "2008-11-06T11:00:00", "dateReserved": "2008-11-06T00:00:00", "dateUpdated": "2024-08-07T10:31:28.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1775 (GCVE-0-2004-1775)
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 01:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:00:37.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-snmp-vacm(6179)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179" }, { "name": "5030", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5030" }, { "name": "VU#645400", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/645400" }, { "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-snmp-vacm(6179)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179" }, { "name": "5030", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5030" }, { "name": "VU#645400", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/645400" }, { "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1775", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-snmp-vacm(6179)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179" }, { "name": "5030", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5030" }, { "name": "VU#645400", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/645400" }, { "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1775", "datePublished": "2005-04-21T04:00:00", "dateReserved": "2005-04-21T00:00:00", "dateUpdated": "2024-08-08T01:00:37.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1222 (GCVE-0-2002-1222)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml" }, { "name": "cisco-catalyst-ciscoview-bo(10382)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10382.php" }, { "name": "5976", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5976" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml" }, { "name": "cisco-catalyst-ciscoview-bo(10382)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10382.php" }, { "name": "5976", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5976" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml" }, { "name": "cisco-catalyst-ciscoview-bo(10382)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10382.php" }, { "name": "5976", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5976" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1222", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-10-17T00:00:00", "dateUpdated": "2024-08-08T03:19:28.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from cvelistv5
Published
2005-12-15 11:00
Modified
2024-08-07 23:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:38:51.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-catalyst-land-dos(44543)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543" }, { "name": "15864", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15864" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "cisco-catalyst-land-dos(44543)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543" }, { "name": "15864", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15864" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-catalyst-land-dos(44543)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543" }, { "name": "15864", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15864" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4258", "datePublished": "2005-12-15T11:00:00", "dateReserved": "2005-12-15T00:00:00", "dateUpdated": "2024-08-07T23:38:51.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5651 (GCVE-0-2007-5651)
Vulnerability from cvelistv5
Published
2007-10-23 21:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27329" }, { "name": "1018842", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018842" }, { "name": "oval:org.mitre.oval:def:5288", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288" }, { "name": "26139", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26139" }, { "name": "cisco-eap-dos(37300)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300" }, { "name": "ADV-2007-3566", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3566" }, { "name": "20071019 Extensible Authentication Protocol Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27329" }, { "name": "1018842", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018842" }, { "name": "oval:org.mitre.oval:def:5288", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288" }, { "name": "26139", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26139" }, { "name": "cisco-eap-dos(37300)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300" }, { "name": "ADV-2007-3566", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3566" }, { "name": "20071019 Extensible Authentication Protocol Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5651", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27329", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27329" }, { "name": "1018842", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018842" }, { "name": "oval:org.mitre.oval:def:5288", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288" }, { "name": "26139", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26139" }, { "name": "cisco-eap-dos(37300)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300" }, { "name": "ADV-2007-3566", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3566" }, { "name": "20071019 Extensible Authentication Protocol Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5651", "datePublished": "2007-10-23T21:00:00", "dateReserved": "2007-10-23T00:00:00", "dateUpdated": "2024-08-07T15:39:13.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0551 (GCVE-0-2004-0551)
Vulnerability from cvelistv5
Published
2004-06-15 04:00
Modified
2024-08-08 00:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#245190", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/245190" }, { "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml" }, { "name": "cisco-catalyst-ack-dos(16370)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#245190", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/245190" }, { "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml" }, { "name": "cisco-catalyst-ack-dos(16370)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0551", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#245190", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/245190" }, { "name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml" }, { "name": "cisco-catalyst-ack-dos(16370)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0551", "datePublished": "2004-06-15T04:00:00", "dateReserved": "2004-06-11T00:00:00", "dateUpdated": "2024-08-08T00:24:26.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-2316 (GCVE-0-2002-2316)
Vulnerability from cvelistv5
Published
2007-10-26 19:00
Modified
2024-09-16 20:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:11.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020618 Re: Catalyst 4000 - Cisco\u0027s Response", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html" }, { "name": "4790", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4790" }, { "name": "cisco-catalyst-unicast-traffic(9148)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9148.php" }, { "name": "20020520 Catalyst 4000", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-26T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020618 Re: Catalyst 4000 - Cisco\u0027s Response", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html" }, { "name": "4790", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4790" }, { "name": "cisco-catalyst-unicast-traffic(9148)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9148.php" }, { "name": "20020520 Catalyst 4000", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020618 Re: Catalyst 4000 - Cisco\u0027s Response", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html" }, { "name": "4790", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4790" }, { "name": "cisco-catalyst-unicast-traffic(9148)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9148.php" }, { "name": "20020520 Catalyst 4000", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2316", "datePublished": "2007-10-26T19:00:00Z", "dateReserved": "2007-10-26T00:00:00Z", "dateUpdated": "2024-09-16T20:02:35.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0216 (GCVE-0-2003-0216)
Vulnerability from cvelistv5
Published
2003-04-26 04:00
Modified
2024-08-08 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:36.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml." }, { "name": "VU#443257", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/443257" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-03-11T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml." }, { "name": "VU#443257", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/443257" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0216", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml." }, { "name": "VU#443257", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/443257" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0216", "datePublished": "2003-04-26T04:00:00", "dateReserved": "2003-04-24T00:00:00", "dateUpdated": "2024-08-08T01:43:36.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4775 (GCVE-0-2006-4775)
Vulnerability from cvelistv5
Published
2006-09-14 00:00
Modified
2024-08-07 19:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:23:40.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt" }, { "name": "21896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21896" }, { "name": "19998", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19998" }, { "name": "28776", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/28776" }, { "name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml" }, { "name": "1016843", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016843" }, { "name": "20060913 Re: Cisco IOS VTP issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded" }, { "name": "ADV-2006-3600", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3600" }, { "name": "cisco-ios-vtp-wrap-config-manipulation(28925)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925" }, { "name": "VU#175148", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/175148" }, { "name": "20060913 Cisco IOS VTP issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded" }, { "name": "21902", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21902" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt" }, { "name": "21896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21896" }, { "name": "19998", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19998" }, { "name": "28776", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/28776" }, { "name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml" }, { "name": "1016843", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016843" }, { "name": "20060913 Re: Cisco IOS VTP issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded" }, { "name": "ADV-2006-3600", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3600" }, { "name": "cisco-ios-vtp-wrap-config-manipulation(28925)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925" }, { "name": "VU#175148", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/175148" }, { "name": "20060913 Cisco IOS VTP issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded" }, { "name": "21902", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21902" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4775", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.phenoelit.de/stuff/CiscoVTP.txt", "refsource": "MISC", "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt" }, { "name": "21896", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21896" }, { "name": "19998", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19998" }, { "name": "28776", "refsource": "OSVDB", "url": "http://www.osvdb.org/28776" }, { "name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml" }, { "name": "1016843", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016843" }, { "name": "20060913 Re: Cisco IOS VTP issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded" }, { "name": "ADV-2006-3600", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3600" }, { "name": "cisco-ios-vtp-wrap-config-manipulation(28925)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925" }, { "name": "VU#175148", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/175148" }, { "name": "20060913 Cisco IOS VTP issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded" }, { "name": "21902", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21902" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4775", "datePublished": "2006-09-14T00:00:00", "dateReserved": "2006-09-13T00:00:00", "dateUpdated": "2024-08-07T19:23:40.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0041 (GCVE-0-2001-0041)
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:54.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001206 Cisco Catalyst Memory Leak Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml" }, { "name": "2072", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2072" }, { "name": "cisco-catalyst-telnet-dos(5656)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656" }, { "name": "801", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/801" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001206 Cisco Catalyst Memory Leak Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml" }, { "name": "2072", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2072" }, { "name": "cisco-catalyst-telnet-dos(5656)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656" }, { "name": "801", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/801" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001206 Cisco Catalyst Memory Leak Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml" }, { "name": "2072", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2072" }, { "name": "cisco-catalyst-telnet-dos(5656)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656" }, { "name": "801", "refsource": "OSVDB", "url": "http://www.osvdb.org/801" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0041", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:54.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1001 (GCVE-0-2003-1001)
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-09-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-12-17T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20031215 Cisco FWSM Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1001", "datePublished": "2003-12-17T05:00:00Z", "dateReserved": "2003-12-16T00:00:00Z", "dateUpdated": "2024-09-16T16:32:54.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1024 (GCVE-0-2002-1024)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5114", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5114" }, { "name": "cisco-ssh-scan-dos(9437)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9437.php" }, { "name": "VU#290140", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/290140" }, { "name": "20020627 Scanning for SSH Can Cause a Crash", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/SSH-scanning.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-06-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5114", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5114" }, { "name": "cisco-ssh-scan-dos(9437)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9437.php" }, { "name": "VU#290140", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/290140" }, { "name": "20020627 Scanning for SSH Can Cause a Crash", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/SSH-scanning.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5114", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5114" }, { "name": "cisco-ssh-scan-dos(9437)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9437.php" }, { "name": "VU#290140", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/290140" }, { "name": "20020627 Scanning for SSH Can Cause a Crash", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/SSH-scanning.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1024", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-08-27T00:00:00", "dateUpdated": "2024-08-08T03:12:16.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0429 (GCVE-0-2001-0429)
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:21:38.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010416 Catalyst 5000 Series 802.1x Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml" }, { "name": "2604", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2604" }, { "name": "cisco-catalyst-8021x-dos(6379)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379" }, { "name": "L-072", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/l-072.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010416 Catalyst 5000 Series 802.1x Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml" }, { "name": "2604", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2604" }, { "name": "cisco-catalyst-8021x-dos(6379)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379" }, { "name": "L-072", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/l-072.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010416 Catalyst 5000 Series 802.1x Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml" }, { "name": "2604", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2604" }, { "name": "cisco-catalyst-8021x-dos(6379)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379" }, { "name": "L-072", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/l-072.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0429", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:21:38.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5134 (GCVE-0-2007-5134)
Vulnerability from cvelistv5
Published
2007-09-27 19:00
Modified
2024-08-07 15:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:28.414Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018743", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018743" }, { "name": "26988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26988" }, { "name": "ADV-2007-3276", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3276" }, { "name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html" }, { "name": "cisco-catalyst-loopback-acl-bypass(36826)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826" }, { "name": "25822", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25822" }, { "name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml" }, { "name": "1018742", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018742" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018743", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018743" }, { "name": "26988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26988" }, { "name": "ADV-2007-3276", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3276" }, { "name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html" }, { "name": "cisco-catalyst-loopback-acl-bypass(36826)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826" }, { "name": "25822", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25822" }, { "name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml" }, { "name": "1018742", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018742" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018743", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018743" }, { "name": "26988", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26988" }, { "name": "ADV-2007-3276", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3276" }, { "name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html" }, { "name": "cisco-catalyst-loopback-acl-bypass(36826)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826" }, { "name": "25822", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25822" }, { "name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml" }, { "name": "1018742", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018742" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5134", "datePublished": "2007-09-27T19:00:00", "dateReserved": "2007-09-27T00:00:00", "dateUpdated": "2024-08-07T15:17:28.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0960 (GCVE-0-2008-0960)
Vulnerability from cvelistv5
Published
2008-06-10 18:00
Modified
2024-08-07 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30574" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30574" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30615" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30648" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30574" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-0960", "datePublished": "2008-06-10T18:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2001-10-09 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.kb.cert.org/vuls/id/139491 | US Government Resource | |
cve@mitre.org | http://www.osvdb.org/1969 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/219257 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/219305 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/3412 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/7242 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/139491 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/1969 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/219257 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/219305 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3412 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/7242 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*", "matchCriteriaId": "9C7C99C7-ABF5-4581-B3CB-A8B2DCD7A5CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*", "matchCriteriaId": "AEB89FCC-6602-4B41-9BFA-91B0B48827A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "13BB143D-CE87-4B5B-8B41-F641C160624F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3AB1738-A733-4227-B389-650FD7559D7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements." } ], "id": "CVE-2001-1071", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-10-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/139491" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1969" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/219257" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/219305" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3412" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/139491" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/219257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/219305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-11-06 15:55
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/49601 | ||
cve@mitre.org | http://secunia.com/advisories/32573 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1021143 | ||
cve@mitre.org | http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/32120 | ||
cve@mitre.org | http://www.securitytracker.com/id?1021144 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/46346 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/49601 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32573 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1021143 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/32120 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1021144 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/46346 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3424FF-8507-4C7A-8858-EA89931A74DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "5802E2D8-7069-474C-826F-AEE7B50BFE34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port." }, { "lang": "es", "value": "Vulnerabilidad inespec\u00edfica en la implementaci\u00f3n en Cisco IOS y CatOS del protocolo VLAN Trunking (VTP), cuando el modo de operaci\u00f3n de VTP no es transparente, permite a atacantes remotos producir una denegaci\u00f3n de servicio (el dispositivo se recarga o se cuelga) a trav\u00e9s de un paquete VTP manipulado." } ], "id": "CVE-2008-4963", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-06T15:55:51.713", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/49601" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32573" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021143" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32120" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021144" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-05-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml. | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/443257 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml. | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/443257 | US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password." }, { "lang": "es", "value": "Vulnerabilidad desconocida en Cisco Catalyst 7.5 permite a usuarios locales saltarse la autenticaci\u00f3n y ganar acceso al modo de activaci\u00f3n sin una contrase\u00f1a." } ], "id": "CVE-2003-0216", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-05-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml." }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/443257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml." }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/443257" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-28 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10382.php | ||
cve@mitre.org | http://www.securityfocus.com/bid/5976 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10382.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5976 | Exploit, Patch |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF90D0A9-302D-4C66-B145-1EAC5EEBFC3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A7B5E1E-5698-4F69-AB53-C9F6339758C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el servidor HTTP embebido en conmutadores Cisco Catalyst corriendo CatOS 5.4 a 7.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reset) mediante una petici\u00f3n HTTP larga." } ], "id": "CVE-2002-1222", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-28T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/10382.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/5976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/10382.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/5976" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-02-16 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/801 | ||
cve@mitre.org | http://www.securityfocus.com/bid/2072 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/5656 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/801 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2072 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/5656 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catos | 4.5\(2\) | |
cisco | catos | 4.5\(3\) | |
cisco | catos | 4.5\(4\) | |
cisco | catos | 4.5\(5\) | |
cisco | catos | 4.5\(6\) | |
cisco | catos | 4.5\(7\) | |
cisco | catos | 4.5\(8\) | |
cisco | catos | 4.5\(9\) | |
cisco | catos | 5.1 | |
cisco | catos | 5.1\(1\) | |
cisco | catos | 5.1\(1a\) | |
cisco | catos | 5.1\(2a\) | |
cisco | catos | 5.2 | |
cisco | catos | 5.2\(1\) | |
cisco | catos | 5.2\(1a\) | |
cisco | catos | 5.2\(2\) | |
cisco | catos | 5.2\(3\) | |
cisco | catos | 5.2\(4\) | |
cisco | catos | 5.2\(5\) | |
cisco | catos | 5.2\(6\) | |
cisco | catos | 5.2\(7\) | |
cisco | catos | 5.3\(1\)csx | |
cisco | catos | 5.3\(1a\)csx | |
cisco | catos | 5.3\(2\)csx | |
cisco | catos | 5.3\(3\)csx | |
cisco | catos | 5.3\(4\)csx | |
cisco | catos | 5.3\(5\)csx | |
cisco | catos | 5.3\(5a\)csx | |
cisco | catos | 5.3\(6\)csx | |
cisco | catos | 5.4 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 5.4\(2\) | |
cisco | catos | 5.4\(3\) | |
cisco | catos | 5.4\(4\) | |
cisco | catos | 5.5 | |
cisco | catos | 5.5\(1\) | |
cisco | catos | 5.5\(2\) | |
cisco | catos | 5.5\(3\) | |
cisco | catos | 5.5\(4\) | |
cisco | catos | 5.5\(4a\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts." } ], "id": "CVE-2001-0041", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-16T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/801" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2072" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-23 21:47
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/27329 | ||
cve@mitre.org | http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/26139 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018842 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3566 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/37300 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27329 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26139 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018842 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3566 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/37300 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catos | 6.1 | |
cisco | catos | 6.2 | |
cisco | catos | 6.3 | |
cisco | catos | 6.4 | |
cisco | catos | 7.1 | |
cisco | catos | 7.2 | |
cisco | catos | 7.3 | |
cisco | catos | 7.4 | |
cisco | catos | 7.5 | |
cisco | catos | 7.6 | |
cisco | catos | 8.1 | |
cisco | catos | 8.2 | |
cisco | catos | 8.3 | |
cisco | catos | 8.4 | |
cisco | catos | 8.5 | |
cisco | ios | 12.1 | |
cisco | ios | 12.2 | |
cisco | ios | 12.3ja | |
cisco | ios | 12.3jea | |
cisco | ios | 12.3jeb | |
cisco | ios | 12.3jec | |
cisco | ios | 12.4ja |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D9D9464-757E-4723-A475-838DCB069FBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "BBAB91B7-D94C-484C-8153-2345FB8991CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "64B40395-B525-4471-8FE1-FB1D7BBD99EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCBC242B-1D34-4CAB-A96D-7B30DD83678B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A7B5E1E-5698-4F69-AB53-C9F6339758C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A01B4160-AC81-4C2D-B34A-C46EC2C610E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "D726FE1E-26C9-41F2-AF59-8F8248449DE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "3CCED76E-89CA-46E3-A285-2FB907780A66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "75165FB6-B193-4DC9-A2FF-20F553111A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "840F1B27-22E4-47C3-A4D9-5E43D5153CAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "5C58A9E7-C119-4DC5-94E4-1701077330EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "matchCriteriaId": "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "matchCriteriaId": "9CD5C082-9730-466D-A4A8-E4EEE5F3730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "matchCriteriaId": "8CF419BD-8474-4F33-9CDD-587E341ABA8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la implementaci\u00f3n Extensible Authentication Protocol (EAP) en Cisco IOS 12.3 y 12.4 sobre Cisco Access Points y 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 y 12.2 sobre Cisco switches (Wired EAP dispositivos), y CatOS 6.x hasta la 8.x sobre Cisco switches permite a atacantes remotos provocar denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un paquete EAP Response Identity manipulado." } ], "id": "CVE-2007-5651", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-23T21:47:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27329" }, { "source": "cve@mitre.org", "url": "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26139" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018842" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3566" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/645400 | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/5030 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6179 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/645400 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5030 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6179 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.0da | |
cisco | ios | 12.0db | |
cisco | ios | 12.0dc | |
cisco | ios | 12.0s | |
cisco | ios | 12.0sc | |
cisco | ios | 12.0sl | |
cisco | ios | 12.0st | |
cisco | ios | 12.0t | |
cisco | ios | 12.0xa | |
cisco | ios | 12.0xb | |
cisco | ios | 12.0xc | |
cisco | ios | 12.0xd | |
cisco | ios | 12.0xe | |
cisco | ios | 12.0xf | |
cisco | ios | 12.0xg | |
cisco | ios | 12.0xh | |
cisco | ios | 12.0xi | |
cisco | ios | 12.0xj | |
cisco | ios | 12.0xk | |
cisco | ios | 12.0xl | |
cisco | ios | 12.0xm | |
cisco | ios | 12.0xn | |
cisco | ios | 12.0xp | |
cisco | ios | 12.0xq | |
cisco | ios | 12.0xr | |
cisco | ios | 12.0xs | |
cisco | ios | 12.0xu | |
cisco | ios | 12.0xv | |
cisco | ios | 12.0xw | |
cisco | ios | 12.1 | |
cisco | ios | 12.1aa | |
cisco | ios | 12.1cx | |
cisco | ios | 12.1da | |
cisco | ios | 12.1db | |
cisco | ios | 12.1dc | |
cisco | ios | 12.1e | |
cisco | ios | 12.1ea | |
cisco | ios | 12.1ec | |
cisco | ios | 12.1ex | |
cisco | ios | 12.1t | |
cisco | ios | 12.1xa | |
cisco | ios | 12.1xb | |
cisco | ios | 12.1xc | |
cisco | ios | 12.1xd | |
cisco | ios | 12.1xe | |
cisco | ios | 12.1xf | |
cisco | ios | 12.1xg | |
cisco | ios | 12.1xh | |
cisco | ios | 12.1xi | |
cisco | ios | 12.1xk | |
cisco | ios | 12.1xl | |
cisco | ios | 12.1xm | |
cisco | ios | 12.1xp | |
cisco | ios | 12.1xq | |
cisco | ios | 12.1xr | |
cisco | ios | 12.1xs | |
cisco | ios | 12.1xt | |
cisco | ios | 12.1xu | |
cisco | ios | 12.1xv | |
cisco | ios | 12.1xw | |
cisco | ios | 12.1xx | |
cisco | ios | 12.1xy | |
cisco | ios | 12.1xz | |
cisco | ios | 12.1ya | |
cisco | ios | 12.1yb | |
cisco | ios | 12.1yc | |
cisco | ios | 12.1yd | |
cisco | catos | 5.5 | |
cisco | catos | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", "matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", "matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", "matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", "matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", "matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", "matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", "matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", "matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*", "matchCriteriaId": "DDBE69A0-85B1-423B-88FB-CDA80E9186EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", "matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", "matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", "matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", "matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", "matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", "matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", "matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", "matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*", "matchCriteriaId": "E2606209-91BE-4BEB-A163-0D3873A033FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", "matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", "matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", "matchCriteriaId": "7A6D5468-BB6A-4665-964F-D8F636359CCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*", "matchCriteriaId": "4D0082D5-CE3E-433A-84E9-1311C8B7899A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", "matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*", "matchCriteriaId": "7ED30640-AABE-4CA2-8B45-509270748BBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", "matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", "matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", "matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", "matchCriteriaId": "6D07DD94-0925-4FEE-9565-5F36B9AAF448", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", "matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", "matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", "matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", "matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", "matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", "matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", "matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", "matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", "matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", "matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", "matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", "matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*", "matchCriteriaId": "8A11AF3F-C82F-4431-9CF1-84FDAD388D04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", "matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", "matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", "matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", "matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", "matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", "matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", "matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", "matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", "matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", "matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", "matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", "matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", "matchCriteriaId": "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", "matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", "matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string." } ], "id": "CVE-2004-1775", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/645400" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5030" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/645400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html | Exploit | |
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html | Exploit | |
cve@mitre.org | http://www.iss.net/security_center/static/9148.php | ||
cve@mitre.org | http://www.securityfocus.com/bid/4790 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/9148.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4790 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing." } ], "id": "CVE-2002-2316", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9148.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9148.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4790" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/SSH-scanning.shtml | ||
cve@mitre.org | http://www.iss.net/security_center/static/9437.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/290140 | US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/5114 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/SSH-scanning.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/9437.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/290140 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5114 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.0s | |
cisco | ios | 12.0sp | |
cisco | ios | 12.0st | |
cisco | ios | 12.0xb | |
cisco | ios | 12.0xm | |
cisco | ios | 12.0xv | |
cisco | ios | 12.1\(1\)ex | |
cisco | ios | 12.1\(5c\)ex | |
cisco | ios | 12.1\(8a\)ex | |
cisco | ios | 12.1\(9\)ex | |
cisco | ios | 12.1e | |
cisco | ios | 12.1ec | |
cisco | ios | 12.1t | |
cisco | ios | 12.1xb | |
cisco | ios | 12.1xc | |
cisco | ios | 12.1xf | |
cisco | ios | 12.1xg | |
cisco | ios | 12.1xh | |
cisco | ios | 12.1xi | |
cisco | ios | 12.1xj | |
cisco | ios | 12.1xl | |
cisco | ios | 12.1xm | |
cisco | ios | 12.1xp | |
cisco | ios | 12.1xq | |
cisco | ios | 12.1xt | |
cisco | ios | 12.1xu | |
cisco | ios | 12.1yb | |
cisco | ios | 12.1yc | |
cisco | ios | 12.1yd | |
cisco | ios | 12.1ye | |
cisco | ios | 12.1yf | |
cisco | ios | 12.1yi | |
cisco | ios | 12.2 | |
cisco | ios | 12.2b | |
cisco | ios | 12.2bc | |
cisco | ios | 12.2da | |
cisco | ios | 12.2dd | |
cisco | ios | 12.2s | |
cisco | ios | 12.2t | |
cisco | ios | 12.2xa | |
cisco | ios | 12.2xb | |
cisco | ios | 12.2xd | |
cisco | ios | 12.2xe | |
cisco | ios | 12.2xf | |
cisco | ios | 12.2xg | |
cisco | ios | 12.2xh | |
cisco | ios | 12.2xi | |
cisco | ios | 12.2xj | |
cisco | ios | 12.2xk | |
cisco | ios | 12.2xl | |
cisco | ios | 12.2xm | |
cisco | ios | 12.2xn | |
cisco | ios | 12.2xq | |
cisco | ios | 12.2xr | |
cisco | ios | 12.2xs | |
cisco | ios | 12.2xt | |
cisco | ios | 12.2xw | |
cisco | ios | 12.2ya | |
cisco | ios | 12.2yb | |
cisco | ios | 12.2yc | |
cisco | ios | 12.2yd | |
cisco | ios | 12.2yf | |
cisco | ios | 12.2yg | |
cisco | ios | 12.2yh | |
cisco | pix_firewall_software | 5.2 | |
cisco | pix_firewall_software | 5.3 | |
cisco | pix_firewall_software | 6.0 | |
cisco | pix_firewall_software | 6.1 | |
cisco | pix_firewall_software | 6.2 | |
cisco | css11000_content_services_switch | * | |
cisco | catos | 5.3\(1\)csx | |
cisco | catos | 5.3\(1a\)csx | |
cisco | catos | 5.3\(2\)csx | |
cisco | catos | 5.3\(3\)csx | |
cisco | catos | 5.3\(4\)csx | |
cisco | catos | 5.3\(5\)csx | |
cisco | catos | 5.3\(5a\)csx | |
cisco | catos | 5.3\(6\)csx | |
cisco | catos | 5.4 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 5.4\(2\) | |
cisco | catos | 5.4\(3\) | |
cisco | catos | 5.4\(4\) | |
cisco | catos | 5.5 | |
cisco | catos | 5.5\(1\) | |
cisco | catos | 5.5\(2\) | |
cisco | catos | 5.5\(3\) | |
cisco | catos | 5.5\(4\) | |
cisco | catos | 5.5\(4a\) | |
cisco | catos | 5.5\(4b\) | |
cisco | catos | 5.5\(13\) | |
cisco | catos | 6.1\(1\) | |
cisco | catos | 6.1\(1a\) | |
cisco | catos | 6.1\(1b\) | |
cisco | catos | 6.1\(1c\) | |
cisco | catos | 6.1\(2.13\) | |
cisco | catos | 6.2\(0.110\) | |
cisco | catos | 6.2\(0.111\) | |
cisco | catos | 6.3\(0.7\)pan | |
cisco | catos | 6.3\(4\) | |
cisco | catos | 7.1 | |
cisco | catos | 7.1\(2\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", "matchCriteriaId": "932C1AC0-0BD1-46DF-A241-AA71BBD785BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", "matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", "matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "96541BD7-7D90-4C56-BC23-7071A07711DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "1637C389-A962-4695-AC35-47785C205FE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "5EA87A2A-E394-4EA4-82BA-9CA3A561C8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", "matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", "matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", "matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", "matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", "matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", "matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", "matchCriteriaId": "80E8AF76-0A1D-4BAE-BF10-D63080352E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", "matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", "matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", "matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", "matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", "matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", "matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", "matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", "matchCriteriaId": "C1835410-77EB-46F2-ACF0-379759D4B0D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", "matchCriteriaId": "3BB103ED-B170-4193-84CD-4C59F4D6A10A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", "matchCriteriaId": "63D55886-268F-4E4D-B00F-8A5D97A73BA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "matchCriteriaId": "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41749-91FC-43DB-A52F-AC3E3A2205C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "matchCriteriaId": "E74B6350-C2F8-4786-8E32-2ED6C188A5E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "matchCriteriaId": "F8E26473-A8EF-44C5-B550-5E0B86D31291", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "matchCriteriaId": "663FE3CE-FA09-46A2-9C0D-2797D9137A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "999A0969-60EB-4B2E-A274-9F05D9F840E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "ED24C763-7558-4AC0-AE10-FDA3D3078D27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "78F98CD7-A352-483C-9968-8FB2627A7CBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "07E1B690-C58B-4C08-A757-F3DF451FDAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*", "matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*", "matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144)." } ], "id": "CVE-2002-1024", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/SSH-scanning.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9437.php" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/290140" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/SSH-scanning.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9437.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/290140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5114" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-04-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/1288 | ||
cve@mitre.org | http://www.securityfocus.com/bid/1122 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/1288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/1122 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password." } ], "id": "CVE-2000-0267", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-04-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1288" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1122" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catalyst_6500 | * | |
cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
cisco | firewall_services_module | * | |
cisco | firewall_services_module | 1.1.2 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set." }, { "lang": "es", "value": "El M\u00f3dulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda y recarga) mediante SNMPv3 cuando est\u00e1 establecido snmp-server." } ], "id": "CVE-2003-1002", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-01-05T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/245190 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/16370 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/245190 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/16370 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catos | 2.1\(1\) | |
cisco | catos | 2.1\(2\) | |
cisco | catos | 2.1\(3\) | |
cisco | catos | 2.1\(4\) | |
cisco | catos | 2.1\(5\) | |
cisco | catos | 2.1\(6\) | |
cisco | catos | 2.1\(7\) | |
cisco | catos | 2.1\(8\) | |
cisco | catos | 2.1\(9\) | |
cisco | catos | 2.1\(10\) | |
cisco | catos | 2.1\(11\) | |
cisco | catos | 2.1\(12\) | |
cisco | catos | 2.2\(1\) | |
cisco | catos | 2.2\(2\) | |
cisco | catos | 2.3\(1\) | |
cisco | catos | 2.4\(1\) | |
cisco | catos | 2.4\(2\) | |
cisco | catos | 2.4\(3\) | |
cisco | catos | 2.4\(4\) | |
cisco | catos | 2.4\(5\) | |
cisco | catos | 2.4\(5a\) | |
cisco | catos | 3.0\(7\) | |
cisco | catos | 3.1\(1\) | |
cisco | catos | 3.1\(2\) | |
cisco | catos | 3.1\(2a\) | |
cisco | catos | 3.2\(1\) | |
cisco | catos | 3.2\(1b\) | |
cisco | catos | 3.2\(2\) | |
cisco | catos | 3.2\(3\) | |
cisco | catos | 3.2\(4\) | |
cisco | catos | 3.2\(5\) | |
cisco | catos | 3.2\(6\) | |
cisco | catos | 3.2\(7\) | |
cisco | catos | 3.2\(8\)gdr | |
cisco | catos | 4.1\(1\) | |
cisco | catos | 4.1\(2\) | |
cisco | catos | 4.1\(3\) | |
cisco | catos | 4.2\(1\) | |
cisco | catos | 4.2\(2\) | |
cisco | catos | 4.3\(1a\) | |
cisco | catos | 4.4\(1\) | |
cisco | catos | 4.5\(1\) | |
cisco | catos | 4.5\(2\) | |
cisco | catos | 4.5\(3\) | |
cisco | catos | 4.5\(4\) | |
cisco | catos | 4.5\(5\) | |
cisco | catos | 4.5\(6\) | |
cisco | catos | 4.5\(6a\) | |
cisco | catos | 4.5\(7\) | |
cisco | catos | 4.5\(8\) | |
cisco | catos | 4.5\(9\) | |
cisco | catos | 4.5\(10\) | |
cisco | catos | 4.5\(11\) | |
cisco | catos | 4.5\(12\) | |
cisco | catos | 4.5\(12a\) | |
cisco | catos | 4.5\(13\) | |
cisco | catos | 4.5\(13a\) | |
cisco | catos | 4.5\(14\) | |
cisco | catos | 5.1\(1\) | |
cisco | catos | 5.1\(1\)csx | |
cisco | catos | 5.1\(1a\) | |
cisco | catos | 5.1\(1a\)csx | |
cisco | catos | 5.1\(2a\) | |
cisco | catos | 5.1\(2b\) | |
cisco | catos | 5.2\(1\) | |
cisco | catos | 5.2\(1\)csx | |
cisco | catos | 5.2\(2\) | |
cisco | catos | 5.2\(2\)csx | |
cisco | catos | 5.2\(3\) | |
cisco | catos | 5.2\(3\)csx | |
cisco | catos | 5.2\(3a\)csx | |
cisco | catos | 5.2\(4\) | |
cisco | catos | 5.2\(5\) | |
cisco | catos | 5.2\(6\) | |
cisco | catos | 5.2\(7\) | |
cisco | catos | 5.2\(7a\) | |
cisco | catos | 5.3\(1a\)csx | |
cisco | catos | 5.3\(2\)csx | |
cisco | catos | 5.3\(3\)csx | |
cisco | catos | 5.3\(4\)csx | |
cisco | catos | 5.3\(5\)csx | |
cisco | catos | 5.3\(5a\)csx | |
cisco | catos | 5.3\(6\)csx | |
cisco | catos | 5.3\(6a\)csx | |
cisco | catos | 5.4 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 5.4\(1\)deferred | |
cisco | catos | 5.4\(2\) | |
cisco | catos | 5.4\(2a\) | |
cisco | catos | 5.4\(3\) | |
cisco | catos | 5.4\(4\) | |
cisco | catos | 5.4\(4a\) | |
cisco | catos | 5.5 | |
cisco | catos | 5.5\(1\) | |
cisco | catos | 5.5\(1a\) | |
cisco | catos | 5.5\(2\) | |
cisco | catos | 5.5\(3\) | |
cisco | catos | 5.5\(4\) | |
cisco | catos | 5.5\(4a\) | |
cisco | catos | 5.5\(4b\) | |
cisco | catos | 5.5\(5\) | |
cisco | catos | 5.5\(6\) | |
cisco | catos | 5.5\(6a\) | |
cisco | catos | 5.5\(7\) | |
cisco | catos | 5.5\(7a\) | |
cisco | catos | 5.5\(8\) | |
cisco | catos | 5.5\(8a\) | |
cisco | catos | 5.5\(8a\)cv | |
cisco | catos | 5.5\(9\) | |
cisco | catos | 5.5\(10\) | |
cisco | catos | 5.5\(10a\) | |
cisco | catos | 5.5\(11\) | |
cisco | catos | 5.5\(11a\) | |
cisco | catos | 5.5\(12\) | |
cisco | catos | 5.5\(12a\) | |
cisco | catos | 5.5\(13\) | |
cisco | catos | 5.5\(13.5\) | |
cisco | catos | 5.5\(13a\) | |
cisco | catos | 5.5\(14\) | |
cisco | catos | 5.5\(15\) | |
cisco | catos | 5.5\(16\) | |
cisco | catos | 5.5\(16.2\) | |
cisco | catos | 5.5\(17\) | |
cisco | catos | 5.5\(18\) | |
cisco | catos | 5.5\(19\) | |
cisco | catos | 6.1 | |
cisco | catos | 6.1\(1\) | |
cisco | catos | 6.1\(1a\) | |
cisco | catos | 6.1\(1b\) | |
cisco | catos | 6.1\(1c\) | |
cisco | catos | 6.1\(1d\) | |
cisco | catos | 6.1\(1e\) | |
cisco | catos | 6.1\(2\) | |
cisco | catos | 6.1\(2a\) | |
cisco | catos | 6.1\(3\) | |
cisco | catos | 6.1\(3a\) | |
cisco | catos | 6.1\(4\) | |
cisco | catos | 6.1\(4b\) | |
cisco | catos | 6.2\(1\) | |
cisco | catos | 6.2\(1a\) | |
cisco | catos | 6.2\(2\) | |
cisco | catos | 6.2\(2a\) | |
cisco | catos | 6.2\(3\) | |
cisco | catos | 6.2\(3a\) | |
cisco | catos | 6.3\(1\) | |
cisco | catos | 6.3\(1a\) | |
cisco | catos | 6.3\(2\) | |
cisco | catos | 6.3\(2a\) | |
cisco | catos | 6.3\(3\) | |
cisco | catos | 6.3\(3\)x | |
cisco | catos | 6.3\(3\)x1 | |
cisco | catos | 6.3\(3a\) | |
cisco | catos | 6.3\(4\) | |
cisco | catos | 6.3\(4a\) | |
cisco | catos | 6.3\(5\) | |
cisco | catos | 6.3\(5.10\) | |
cisco | catos | 6.3\(6\) | |
cisco | catos | 6.3\(7\) | |
cisco | catos | 6.3\(8\) | |
cisco | catos | 6.3\(8.3\) | |
cisco | catos | 6.3\(9\) | |
cisco | catos | 6.3\(10\) | |
cisco | catos | 6.4\(1\) | |
cisco | catos | 6.4\(2\) | |
cisco | catos | 6.4\(3\) | |
cisco | catos | 6.4\(4a\) | |
cisco | catos | 6.4\(5\) | |
cisco | catos | 6.4\(6\) | |
cisco | catos | 6.4\(7\) | |
cisco | catos | 6.4\(8\) | |
cisco | catos | 7.1\(1\) | |
cisco | catos | 7.1\(1a\) | |
cisco | catos | 7.1\(2\) | |
cisco | catos | 7.1\(2a\) | |
cisco | catos | 7.2\(0.65\) | |
cisco | catos | 7.2\(1\) | |
cisco | catos | 7.2\(2\) | |
cisco | catos | 7.3 | |
cisco | catos | 7.3\(1\) | |
cisco | catos | 7.3\(2\) | |
cisco | catos | 7.4 | |
cisco | catos | 7.4\(0.2\)clr | |
cisco | catos | 7.4\(0.63\) | |
cisco | catos | 7.4\(1\) | |
cisco | catos | 7.4\(2\) | |
cisco | catos | 7.4\(3\) | |
cisco | catos | 7.5 | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6 | |
cisco | catos | 7.6\(1\) | |
cisco | catos | 7.6\(2\) | |
cisco | catos | 7.6\(3\) | |
cisco | catos | 7.6\(4\) | |
cisco | catos | 7.6\(5\) | |
cisco | catos | 8.1 | |
cisco | catos | 8.1\(2\) | |
cisco | catos | 8.1\(3\) | |
cisco | catos | 8.2 | |
cisco | catos | 8.2\(1\) | |
cisco | catos | 8.3\(1\)glx | |
cisco | catos | 8.3glx | |
cisco | catalyst_2901 | * | |
cisco | catalyst_2902 | * | |
cisco | catalyst_2926 | * | |
cisco | catalyst_2926f | * | |
cisco | catalyst_2926gl | * | |
cisco | catalyst_2926gs | * | |
cisco | catalyst_2926t | * | |
cisco | catalyst_2948 | * | |
cisco | catalyst_2948-ge-tx | * | |
cisco | catalyst_2948g-l3 | * | |
cisco | catalyst_2980g | * | |
cisco | catalyst_2980g-a | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4500 | * | |
cisco | catalyst_4503 | * | |
cisco | catalyst_4506 | * | |
cisco | catalyst_4507r | * | |
cisco | catalyst_4510r | * | |
cisco | catalyst_4912g | * | |
cisco | catalyst_5000 | * | |
cisco | catalyst_6000_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6000_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6000_ws-x6380-nam | 3.1\(1a\) | |
cisco | catos | 4.5\(2\) | |
cisco | catos | 4.5\(3\) | |
cisco | catos | 4.5\(4\) | |
cisco | catos | 4.5\(4b\) | |
cisco | catos | 4.5\(5\) | |
cisco | catos | 4.5\(6\) | |
cisco | catos | 4.5\(7\) | |
cisco | catos | 4.5\(8\) | |
cisco | catos | 4.5\(9\) | |
cisco | catos | 4.5\(10\) | |
cisco | catos | 4.5\(11\) | |
cisco | catos | 4.5\(12\) | |
cisco | catos | 4.5\(13a\) | |
cisco | catos | 4.5.10 | |
cisco | catos | 5.1 | |
cisco | catos | 5.1\(1\) | |
cisco | catos | 5.1\(1a\) | |
cisco | catos | 5.1\(2a\) | |
cisco | catos | 5.2 | |
cisco | catos | 5.2\(1\) | |
cisco | catos | 5.2\(1a\) | |
cisco | catos | 5.2\(2\) | |
cisco | catos | 5.2\(3\) | |
cisco | catos | 5.2\(4\) | |
cisco | catos | 5.2\(5\) | |
cisco | catos | 5.2\(6\) | |
cisco | catos | 5.2\(7\) | |
cisco | catos | 5.3\(1\)csx | |
cisco | catos | 5.3\(1a\)csx | |
cisco | catos | 5.3\(2\)csx | |
cisco | catos | 5.3\(3\)csx | |
cisco | catos | 5.3\(4\)csx | |
cisco | catos | 5.3\(5\)csx | |
cisco | catos | 5.3\(5a\)csx | |
cisco | catos | 5.3\(6\)csx | |
cisco | catos | 5.4 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 5.4\(2\) | |
cisco | catos | 5.4\(3\) | |
cisco | catos | 5.4\(4\) | |
cisco | catos | 5.5 | |
cisco | catos | 5.5\(1\) | |
cisco | catos | 5.5\(2\) | |
cisco | catos | 5.5\(3\) | |
cisco | catos | 5.5\(4\) | |
cisco | catos | 5.5\(4a\) | |
cisco | catos | 5.5\(4b\) | |
cisco | catos | 5.5\(5\) | |
cisco | catos | 5.5\(6\) | |
cisco | catos | 5.5\(7\) | |
cisco | catos | 5.5\(13\) | |
cisco | catos | 6.1\(1\) | |
cisco | catos | 6.1\(1a\) | |
cisco | catos | 6.1\(1b\) | |
cisco | catos | 6.1\(1c\) | |
cisco | catos | 6.1\(2\) | |
cisco | catos | 6.1\(2.13\) | |
cisco | catos | 6.1\(3\) | |
cisco | catos | 6.2\(0.110\) | |
cisco | catos | 6.2\(0.111\) | |
cisco | catos | 6.3\(0.7\)pan | |
cisco | catos | 6.3\(4\) | |
cisco | catos | 6.3\(5\) | |
cisco | catos | 7.1 | |
cisco | catos | 7.1\(2\) | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "185CC3F3-624B-4372-80EC-D8B4BC00384A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF9A337F-7318-4163-9B6F-9ED7783CF94C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "A66B1FC1-F9EA-403D-A63C-E1D7AC108346", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "32B13D84-10A7-44C5-B771-B9F237954B2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "EDA1D807-2C93-4C94-9CA2-D4875FB0DFA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "381D0006-EE25-4B36-B9E4-65C41E7EFBAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B68ECE9E-6657-46E4-B427-C321289CF78B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9658139-AC5C-4D4C-B8E2-055DD70EDFF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "434383D6-7DE3-4A3E-8B9E-4F7F79A66807", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "E40FC4F6-200D-4150-9353-CA0CD1FF8F92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "D48351F4-51C7-4BE7-B91A-3E2FAD5A2C85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "5D12B329-490F-4084-8C12-3EE1394EE6E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8499827B-94C6-4259-BA90-8A5331AF0CD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "36C122D0-D434-4AD4-BD57-E236BA89B85E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E02B8D53-4193-4163-BF22-5534CC73ABB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1884794C-360E-4C03-ABAC-EA0007F44ED5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "F84BC6D0-B18F-4A6F-AF51-6FA4CC83DE88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA89EF90-0DAA-4D5E-9881-6C3A000A2ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1ED7AAA-6978-4438-B896-F6182882CEC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5049D68-0729-40CF-827F-E3F59EE9214A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:2.4\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D93FEAFC-0D2E-46A9-BFD9-5C636D8AC61C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DC7B86FA-85A8-44D2-A12C-85312B765A6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "36962C89-B7F7-4C47-B9FF-5E23FDBCBB51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC554CE9-63AA-4BC9-86F8-F3D5968733CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0077517D-E7E3-4A41-87C7-4DECECC44196", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "B44D6DEB-84F8-4DA7-82BE-E5839BA5799C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6E28F17F-12BF-48E3-B552-868F8A36B44A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "56124CD6-9802-4663-AB37-D986CB8023C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7161615-2958-4F0A-907D-4A300D0C00C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C1104B88-1AA1-4164-B12D-970A6D0F531B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B5B3D72-7248-4518-8E3A-463AF552493E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "24F6CF22-D4B8-4857-99F8-7D1329CA33D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.2\\(8\\)gdr:*:*:*:*:*:*:*", "matchCriteriaId": "DE024D9D-6B5B-4F50-84A3-1C2DACD924EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "92FFF1BF-4252-4183-BF0A-64074379AF09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE4395AE-BAD2-4498-9A16-525CA4944001", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "09735A07-0FDD-4235-BCA6-377D5882F114", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE58DBF3-2ECB-4B8E-A08A-D76C3ECC09D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8500DBD9-61EC-4C9B-8F1E-ED10CBD2F804", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.3\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "157FBE0B-F0BD-4E94-9C3D-349DD65F8310", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "44EAC49D-3B1F-4264-A1FE-37D55525122D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3AB1738-A733-4227-B389-650FD7559D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "21C26AFA-1147-4888-AB70-E751349A29DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12a\\):*:*:*:*:*:*:*", "matchCriteriaId": "699AF98D-F7F6-4FDE-9CEB-F63E5BCD8EDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "73A63535-F3C1-42C8-98EA-355F08AA66F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "5404C55E-F7F4-4C83-87BE-02B93F76DC4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "6B5397DA-73CF-412B-A797-E6DEEC395FEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "8B53B40D-E949-4811-A483-207F69BB35D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C4E5CD6-16CE-41B0-9203-88F10A43247E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C6955CCC-F43D-44D4-8714-0FA766C10C6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "23C82260-D8F9-48DE-AF84-B9B65BB9E277", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E08E971E-5FF1-48F7-8A68-FB1BB80908BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBA3BD8A-FB4A-47C6-B7AB-802393DCA19C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D16366-422C-4291-A0F1-050AD80E8A7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D3189-2552-43B0-89E7-DFDB4A152A56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\)deferred:*:*:*:*:*:*:*", "matchCriteriaId": "528940FF-E621-43B8-B562-D9B51231E1FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FA107149-E36F-4D9E-A0C5-8BAA661F18C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "8EB2FF0C-B5F1-4FDF-B57B-7A7114E09DFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7146FDF-3644-469D-8AA1-6AD19BFB5A06", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6443D518-066C-46E4-90EA-94BF860741A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB127898-E068-4696-A72D-5EDE1730E320", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "1255E56C-2DEB-4B86-97A7-7CF6316A2C21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BBFE844-7084-4F81-BC5B-42FED826AD12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(8a\\)cv:*:*:*:*:*:*:*", "matchCriteriaId": "61FC0A1A-4A1F-4B38-86BA-3DADDB1D6BAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "753AC7F2-83B7-4288-926B-73774A126D1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB1C6B11-4AE9-459B-870A-4845DA43ADC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(10a\\):*:*:*:*:*:*:*", "matchCriteriaId": "45C18C9D-89F3-43BD-A3A8-EA8EF5BC6E8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11B940-0EA7-4ABE-AA08-29646083E077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(11a\\):*:*:*:*:*:*:*", "matchCriteriaId": "ABEF59A8-3DAD-4DAE-80BF-9AED862B734D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "46B1EA66-327F-4FB9-A316-2C29B52AA33A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(12a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F854B7F7-9EDE-4452-85DC-01686BC58D21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "717511D5-C05C-4D78-A76D-62E196E1FA1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF90D0A9-302D-4C66-B145-1EAC5EEBFC3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "9AD4C82A-CDB7-403E-A6B8-7AFF28D2B341", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "014BA0A4-F21F-4226-A3F9-50C95C2D1B76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9524A795-3462-4D7B-AEA2-318EE40743E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(16.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DDD57B8-9123-4F59-8449-F7E404C2E081", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "9AB54D04-F672-4009-B9D5-FA111D16996C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "5EDA2CA5-0DC9-4B33-B3FD-67867D6360DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0F9CA24-9D6E-4408-AB1B-55DA4D63F871", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CB27CF6D-0CCC-43C6-A19D-8BB5EC63AFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B12A4460-1B54-45D6-BE01-28BD52E1DC45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E88E2AD3-68B4-4473-8393-8E792F2539D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9160267C-8FDB-41BB-96C0-2EAEB75BA102", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB7870CC-BAB2-4BC7-A35B-6629BD325D0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7A98413C-3659-4959-B4C6-7787D0D15878", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "9626715B-2878-41CF-9CCF-84553230EB55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7512F24B-D150-4A31-807A-37B6DCAEAE4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D5183C6-CBD7-4FA0-A6FA-8B35E87E59BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A614780A-D5B8-4368-9255-770C52EF1A2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3669F2-4892-4936-8A7E-59D640CEBEA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "30ADFF58-A65F-42F6-97BD-17E491302AA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B243E03B-3A82-40D5-8B47-AED222CF45DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5E7DF31-2345-4139-BE3D-94128E14F84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\)x:*:*:*:*:*:*:*", "matchCriteriaId": "B60504C4-09F6-4D5C-AF5E-58446C6FA49B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3\\)x1:*:*:*:*:*:*:*", "matchCriteriaId": "34A4E69C-5E3B-4014-9382-E1FA72C31C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "5EEF50D9-DE68-4FD0-94F8-45EF319A0332", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B1A05FF1-D9AF-4752-9E4A-496DAF78D4B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "CBD37D98-2F73-4CC8-9FB3-5FCC7AA4EB31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F5F64FB9-F6E5-4A96-89FA-23E0531E7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "85342953-6AC3-42C3-B5BD-849FD40675F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "03C856BF-4112-454F-BBE3-AFC195F0BAF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(8.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "4855D79B-7AC5-4E61-A9B1-1A770C1F21B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68C6298-F045-4573-ACCD-1A82E09D72E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "EFE2BF70-A2B4-44A8-820E-4B95D458307F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "980DC7C0-0200-4C4B-8D14-09EB151B09B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "432A925A-1922-4562-841B-65180917D22D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E444F7F2-5526-45C0-AD38-E8A41023B376", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3EE2A06-BA13-4F28-A00B-057DDA2B2CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0CE99942-0989-47F9-B5AD-FBF4CE4216B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "D798B64D-FE4A-4129-8D5A-7C123F5DFC9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "30F7A129-D4EA-4F66-B6A4-147AAB3E624C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE867B59-439F-4620-A785-E16F2C6DBC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEF0CFFD-7889-4B33-AFCD-E3EA978214D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7EF7E63-17F6-4D92-AAB0-205BC44940DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.2\\(0.65\\):*:*:*:*:*:*:*", "matchCriteriaId": "94D3F3AF-C844-4445-88E8-9608653B83C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A64DE87-64E6-4A2C-A932-D5ADBAE9A09E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE322AC8-E45F-4C43-BD6A-2FA883AD33C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0462C72E-7110-48FC-BC88-FF8A5663C6B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A7B5E1E-5698-4F69-AB53-C9F6339758C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4\\(0.2\\)clr:*:*:*:*:*:*:*", "matchCriteriaId": "F494A6B7-75D4-4A04-889E-7269098AF23D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4\\(0.63\\):*:*:*:*:*:*:*", "matchCriteriaId": "E79A55B3-65CD-40D7-9215-BC924C519512", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BBEB96B9-6F4C-4C5D-BF6F-BE65C3A96C9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "7D45D090-EFAA-4D2F-BE05-1726E05B12C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "43A64E8E-A8ED-414F-BC61-846AD5D582B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A01B4160-AC81-4C2D-B34A-C46EC2C610E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "D726FE1E-26C9-41F2-AF59-8F8248449DE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BE121926-3978-4220-AC94-30A3E4BC2BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "760418C3-E160-4468-A47A-7632245EDD84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "28CA144F-341E-4F88-8D67-103F8619B742", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "3CCED76E-89CA-46E3-A285-2FB907780A66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AFA7E37-DB5D-4E4C-B48E-37DF120D5DE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "786657C5-9EA5-45D0-B2F8-01AB599F4954", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "75165FB6-B193-4DC9-A2FF-20F553111A1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5EAA2D25-6F7C-4EAD-B2BC-B17B21C62A6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.3\\(1\\)glx:*:*:*:*:*:*:*", "matchCriteriaId": "0C0D1A2C-EC6F-4725-B305-42CBA32C1682", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:8.3glx:*:*:*:*:*:*:*", "matchCriteriaId": "A95D74BA-04CC-46AB-9F7A-BFF1CE165778", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*", "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*", "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*", "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*", "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*", "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*", "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*", "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*", "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*", "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "D105C909-39B4-4B35-9D6E-3BC78491759F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*", "matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*", "matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"" }, { "lang": "es", "value": "Cisco CatOS anteriores a 5.5(20) a 8.x anteriores a 8.2(2) y 8.3(3) GLX, usados en conmutadores Catalyst, permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del sistema y reinicio) enviando paqu\u00e9tes no v\u00e1lidos en lugar de la porci\u00f3n final ACK del apret\u00f3n de manos (handshake) en tres pasos a los servicios \r\n(1) Telnet, (2) HTTP, o (3) SSH. Tambi\u00e9n conocida como aka \"ataque de DoS TCP-ACK \"." } ], "id": "CVE-2004-0551", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/245190" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/245190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-09-27 19:17
Modified
2025-04-09 00:30
Severity ?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2007/Sep/0573.html | ||
cve@mitre.org | http://secunia.com/advisories/26988 | ||
cve@mitre.org | http://securitytracker.com/id?1018742 | ||
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/25822 | Exploit | |
cve@mitre.org | http://www.securitytracker.com/id?1018743 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3276 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36826 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2007/Sep/0573.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26988 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018742 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25822 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018743 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3276 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36826 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catalyst_6500 | * | |
cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_7600 | * | |
cisco | catalyst_7600 | * | |
cisco | catalyst_7600 | * | |
cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*", "matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*", "matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended." }, { "lang": "es", "value": "Las series de dispositivos Cisco Catalyst 6500 y Cisco 7600 utilizan direcciones IP 127/8 para el Canal Ethernet Fuera de Banda (EOBC, Ethernet Out-of-Band Channel), lo cual permite a atacantes remotos enviar paquetes a una interfaz para la cual la exposici\u00f3n de la red no era intencionada." } ], "id": "CVE-2007-5134", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-27T19:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26988" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018742" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25822" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018743" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3276" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-10 18:32
Modified
2025-04-09 00:30
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
cret@cert.org | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
cret@cert.org | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
cret@cert.org | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
cret@cert.org | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
cret@cert.org | http://secunia.com/advisories/30574 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30596 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30612 | ||
cret@cert.org | http://secunia.com/advisories/30615 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30626 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30647 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30648 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30665 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30802 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31334 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31351 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31467 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31568 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/32664 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/33003 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/35463 | ||
cret@cert.org | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
cret@cert.org | http://securityreason.com/securityalert/3933 | ||
cret@cert.org | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
cret@cert.org | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
cret@cert.org | http://support.apple.com/kb/HT2163 | ||
cret@cert.org | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
cret@cert.org | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
cret@cert.org | http://www.debian.org/security/2008/dsa-1663 | Patch | |
cret@cert.org | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
cret@cert.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
cret@cert.org | http://www.ocert.org/advisories/ocert-2008-006.html | ||
cret@cert.org | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
cret@cert.org | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
cret@cert.org | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
cret@cert.org | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
cret@cert.org | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
cret@cert.org | http://www.securitytracker.com/id?1020218 | ||
cret@cert.org | http://www.ubuntu.com/usn/usn-685-1 | ||
cret@cert.org | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1787/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1788/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1797/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1800/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1801/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1836/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1981/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/2361 | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/2971 | ||
cret@cert.org | http://www.vupen.com/english/advisories/2009/1612 | ||
cret@cert.org | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
cret@cert.org | https://www.exploit-db.com/exploits/5790 | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30574 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30596 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30612 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30615 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30626 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30647 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30648 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30665 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30802 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31334 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31351 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31467 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31568 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32664 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35463 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3933 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT2163 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1663 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2008-006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020218 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-685-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1787/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1788/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1797/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1800/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1801/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1836/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1981/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2971 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1612 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/5790 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catos | 7.1.1 | |
cisco | catos | 7.3.1 | |
cisco | catos | 7.4.1 | |
cisco | catos | 8.3 | |
cisco | cisco_ios | 12.0 | |
cisco | cisco_ios | 12.0 | |
cisco | cisco_ios | 12.1 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | ios | 10.0 | |
cisco | ios | 11.0 | |
cisco | ios | 11.1 | |
cisco | ios | 11.3 | |
cisco | ios | 12.2 | |
cisco | ios_xr | 2.0 | |
cisco | ios_xr | 3.0 | |
cisco | ios_xr | 3.2 | |
cisco | ios_xr | 3.3 | |
cisco | ios_xr | 3.4 | |
cisco | ios_xr | 3.5 | |
cisco | ios_xr | 3.6 | |
cisco | ios_xr | 3.7 | |
cisco | nx_os | 4.0 | |
cisco | nx_os | 4.0.1 | |
cisco | nx_os | 4.0.2 | |
ecos_sourceware | ecos | 1.1 | |
ecos_sourceware | ecos | 1.2.1 | |
ecos_sourceware | ecos | 1.3.1 | |
ecos_sourceware | ecos | 2.0 | |
ecos_sourceware | ecos | 2.0 | |
net-snmp | net_snmp | 5.0 | |
net-snmp | net_snmp | 5.0.1 | |
net-snmp | net_snmp | 5.0.2 | |
net-snmp | net_snmp | 5.0.3 | |
net-snmp | net_snmp | 5.0.4 | |
net-snmp | net_snmp | 5.0.5 | |
net-snmp | net_snmp | 5.0.6 | |
net-snmp | net_snmp | 5.0.7 | |
net-snmp | net_snmp | 5.0.8 | |
net-snmp | net_snmp | 5.0.9 | |
net-snmp | net_snmp | 5.1 | |
net-snmp | net_snmp | 5.1.1 | |
net-snmp | net_snmp | 5.1.2 | |
net-snmp | net_snmp | 5.2 | |
net-snmp | net_snmp | 5.3 | |
net-snmp | net_snmp | 5.3.0.1 | |
net-snmp | net_snmp | 5.4 | |
sun | solaris | 10.0 | |
sun | sunos | 5.10 | |
cisco | ace_10_6504_bundle_with_4_gbps_throughput | * | |
cisco | ace_10_6509_bundle_with_8_gbps_throughput | * | |
cisco | ace_10_service_module | * | |
cisco | ace_20_6504_bundle_with__4gbps_throughput | * | |
cisco | ace_20_6509_bundle_with_8gbps_throughput | * | |
cisco | ace_20_service_module | * | |
cisco | ace_4710 | * | |
cisco | ace_xml_gateway | 5.2 | |
cisco | ace_xml_gateway | 6.0 | |
cisco | mds_9120 | * | |
cisco | mds_9124 | * | |
cisco | mds_9134 | * | |
cisco | mds_9140 | * | |
ingate | ingate_firewall | 2.2.0 | |
ingate | ingate_firewall | 2.2.1 | |
ingate | ingate_firewall | 2.2.2 | |
ingate | ingate_firewall | 2.3.0 | |
ingate | ingate_firewall | 2.4.0 | |
ingate | ingate_firewall | 2.4.1 | |
ingate | ingate_firewall | 2.5.0 | |
ingate | ingate_firewall | 2.6.0 | |
ingate | ingate_firewall | 2.6.1 | |
ingate | ingate_firewall | 3.0.2 | |
ingate | ingate_firewall | 3.1.0 | |
ingate | ingate_firewall | 3.1.1 | |
ingate | ingate_firewall | 3.1.3 | |
ingate | ingate_firewall | 3.1.4 | |
ingate | ingate_firewall | 3.2.0 | |
ingate | ingate_firewall | 3.2.1 | |
ingate | ingate_firewall | 3.2.2 | |
ingate | ingate_firewall | 3.3.1 | |
ingate | ingate_firewall | 4.1.0 | |
ingate | ingate_firewall | 4.1.3 | |
ingate | ingate_firewall | 4.2.1 | |
ingate | ingate_firewall | 4.2.2 | |
ingate | ingate_firewall | 4.2.3 | |
ingate | ingate_firewall | 4.3.1 | |
ingate | ingate_firewall | 4.4.1 | |
ingate | ingate_firewall | 4.4.2 | |
ingate | ingate_firewall | 4.5.1 | |
ingate | ingate_firewall | 4.5.2 | |
ingate | ingate_firewall | 4.6.0 | |
ingate | ingate_firewall | 4.6.1 | |
ingate | ingate_firewall | 4.6.2 | |
ingate | ingate_siparator | 2.2.0 | |
ingate | ingate_siparator | 2.2.1 | |
ingate | ingate_siparator | 2.2.2 | |
ingate | ingate_siparator | 2.3.0 | |
ingate | ingate_siparator | 2.4.0 | |
ingate | ingate_siparator | 2.4.1 | |
ingate | ingate_siparator | 2.5.0 | |
ingate | ingate_siparator | 2.6.0 | |
ingate | ingate_siparator | 2.6.1 | |
ingate | ingate_siparator | 3.0.2 | |
ingate | ingate_siparator | 3.1.0 | |
ingate | ingate_siparator | 3.1.1 | |
ingate | ingate_siparator | 3.1.3 | |
ingate | ingate_siparator | 3.1.4 | |
ingate | ingate_siparator | 3.2.0 | |
ingate | ingate_siparator | 3.2.1 | |
ingate | ingate_siparator | 3.2.2 | |
ingate | ingate_siparator | 3.3.1 | |
ingate | ingate_siparator | 4.1.0 | |
ingate | ingate_siparator | 4.1.3 | |
ingate | ingate_siparator | 4.2.1 | |
ingate | ingate_siparator | 4.2.2 | |
ingate | ingate_siparator | 4.2.3 | |
ingate | ingate_siparator | 4.3.1 | |
ingate | ingate_siparator | 4.3.4 | |
ingate | ingate_siparator | 4.4.1 | |
ingate | ingate_siparator | 4.4.2 | |
ingate | ingate_siparator | 4.5.1 | |
ingate | ingate_siparator | 4.5.2 | |
ingate | ingate_siparator | 4.6.0 | |
ingate | ingate_siparator | 4.6.1 | |
ingate | ingate_siparator | 4.6.2 | |
juniper | session_and_resource_control | 1.0 | |
juniper | session_and_resource_control | 2.0 | |
juniper | src_pe | 1.0 | |
juniper | src_pe | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE64E4C4-BACE-404F-966D-415976781DC4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "377F951F-C2D8-441D-A532-F62E23937F94", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*", "matchCriteriaId": "EB593071-BB5A-47AD-B9C6-59D2010F6280", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*", "matchCriteriaId": "6E2D6402-D2AF-4817-8A46-1FA9B17B720C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*", "matchCriteriaId": "2A419BD7-6345-43D8-B69C-2255E2EF6FD7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "69D2BD63-C110-4E89-B239-4A59E20AB78E", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*", "matchCriteriaId": "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6762126F-55E4-4963-99F5-206A46979E7C", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1945B97A-8276-4EE2-8F76-5F0C0956DF18", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2452913-0513-46BB-A52E-8FA12D77B570", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*", "matchCriteriaId": "5D967624-23B1-48BB-91DB-1E1C18AAAD85", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "77930529-89BE-463D-8259-3D67D153284A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "743DEB17-3BE3-4278-A54B-2CE547DB9F31", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2BCA127-F5F3-418F-890D-6B1C03019590", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BE83150C-456E-462A-A0F1-ED8EAD60D671", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BF5B2431-335C-461B-B07F-88267EA71DCD", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9DBA8E67-021A-4D07-94B9-943A8E1C4468", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "905D1F04-CDFD-4BAD-8939-5ABC70A874E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "00878E69-2721-43E3-A853-D3DCFE5C258D", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C51799BB-D931-436C-8C94-558956AC880A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D498D406-A453-4119-BBA1-4709CF5862AE", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D68555E-BEB9-4F1E-8D6D-C313FB501523", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B44A0D4-3020-414B-81D7-679E8441E182", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*", "matchCriteriaId": "B76A8BD4-E53F-49A6-946B-6E672DD0419C", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1C6B46B-13E2-4DA4-9EF2-007893034269", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "15D3471D-6267-4481-8BBD-BFC106E8F30B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0292228-80D8-4BA4-8662-698D7003D7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "522C9080-86A6-40A8-905C-73187DAF83F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B7A18-F230-44D4-801E-8284085CA1DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E62CC4C-89A7-4594-BDD8-394211889220", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*", "matchCriteriaId": "E152F995-BCD2-4725-A47C-1A5E7D6B9005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E38404-ED69-4B0E-A035-2AF5E0649CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0123D2ED-3983-45D3-B54A-3E75FCE99C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E50E974E-87F5-45A2-88BA-B1E4913E3DAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4AB25CC-BB96-4675-98D7-C5FF30C24014", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C7C95AD-3D5F-458B-A761-5D7779FEA327", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9E4A3F6-5D89-47D0-84AD-601682399D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C700A36D-5FB4-475D-BE85-74511830870A", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "02060365-1D67-4611-8D79-B9FC354EBF99", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "194BD880-F672-4492-8356-B14C8DA8C2DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1D769FC-3081-48F8-BBF1-3964F3F8B569", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A966DB26-8A52-4F4D-9C0E-8A8719A195AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6675DF0-963A-4091-9786-7CE3337EE47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "77A94931-8584-4021-A5BB-83FF22D54955", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F06FB120-9BB3-4363-B2A2-A3475993FDFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8229DE3A-B9CB-44FF-8409-51E09DDED479", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2699E7A6-7B3A-4C4C-9472-B8B6B547624D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D913348F-351C-4D78-A0AA-27B355D52235", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C3E88A46-CEC7-46D5-9697-232E18531FD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0ECFBAFE-9267-469A-A97F-F716969B247C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1559E6-E7B6-4B5B-8841-CF502E05BA46", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F041246F-5B7F-4F63-9E81-02465C9062C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADB78013-DEE9-438E-ABD1-5E3D932177BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D77447C3-AA72-4CAB-A0B1-0883D41AD064", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9C3F04F-7581-4DCA-970D-9FCBB56EA724", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ABF04A7-8230-4AB9-8D66-DF1463037823", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC205E36-7027-4A9B-8574-9BB9C68007A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "69C55DD7-986A-4AB6-8F61-5A5D26531011", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84DDD7E4-D5D7-4341-9482-2B918306578D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "14A3C59C-6A3D-477B-B425-1C085D6951E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "31AA57F4-5023-4333-9F19-C9D362E8E495", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "063034FF-0AB8-4D78-9822-0DCA9657C853", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "67477EC7-363E-45B5-BA53-1A4E9FB20CDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "78E11F95-E635-465C-BD7F-5F7E9192DEAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "74F145F0-573E-4CBC-AB69-3B77D6F9A540", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "49DA7D86-8845-43CA-80DC-3D794322CB28", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABD34FEB-7956-44AE-A510-2E5F9EF61651", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DEF5098-3791-4CEB-A436-2809A4385D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D895880-FB98-4472-A164-458CE086F339", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D7912AA3-0469-479E-9C5A-53F20E504956", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8677C6C8-39CA-492A-A196-9DFAF892120C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "22CE55DE-00CA-4F87-9CA0-80A360E332FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "63DC81FA-A6B4-41DC-8097-8944D06A2451", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB87853E-CAFF-48D8-9C56-A2DE325235D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "61E35451-BEE3-412A-8706-5522C00BE1DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F45326B3-CC4E-4C3A-9819-28936A0432F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDBF1A78-7190-4326-84BD-C18CC354DA38", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D97FFBA0-2E80-40EF-A4AC-F26D3490371E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A442F5B-5A1A-4CD0-B693-851FFB917E5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "646BF70F-CB7B-48E3-8563-E089E1CECD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CD34A7B-508C-45F2-8725-FE42398D3652", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2785732-A5C7-434E-B45D-13138B574F45", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A07E1241-24BE-48D3-B737-56B2AAA3AF64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB751FD-CCCA-4131-A24F-65DEF1128B26", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D106F4E4-4B41-4002-8C34-6A9C3A0FF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "863583DC-DD93-46DC-BA06-0B838CDB2565", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." }, { "lang": "es", "value": "Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte." } ], "id": "CVE-2008-0960", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-10T18:32:00.000", "references": [ { "source": "cret@cert.org", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "cret@cert.org", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "cret@cert.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/30612" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/35463" }, { "source": "cret@cert.org", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "cret@cert.org", "url": "http://securityreason.com/securityalert/3933" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "cret@cert.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "cret@cert.org", "url": "http://support.apple.com/kb/HT2163" }, { "source": "cret@cert.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "cret@cert.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "cret@cert.org", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "cret@cert.org", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "cret@cert.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "cret@cert.org", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "cret@cert.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "cret@cert.org", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT2163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.ciac.org/ciac/bulletins/l-072.shtml | ||
cve@mitre.org | http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2604 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6379 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ciac.org/ciac/bulletins/l-072.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2604 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6379 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "D105C909-39B4-4B35-9D6E-3BC78491759F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A7AFDED-7F44-438D-9FFD-270856A41275", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service." } ], "id": "CVE-2001-0429", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-07-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/l-072.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2604" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/l-072.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-15 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/15864 | Exploit | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/44543 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15864 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/44543 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catalyst | 4.5_\(10\) | |
cisco | catalyst | sup2plus | |
cisco | catalyst | sup3 | |
cisco | catalyst_1200_series | * | |
cisco | catalyst_1900_series | * | |
cisco | catalyst_1900_series | 9.0_0.07 | |
cisco | catalyst_2800_series | * | |
cisco | catalyst_2820 | * | |
cisco | catalyst_2820 | 9.0_0.07 | |
cisco | catalyst_2900 | * | |
cisco | catalyst_2900 | lre_xl | |
cisco | catalyst_2900 | xl | |
cisco | catalyst_2901 | * | |
cisco | catalyst_2902 | * | |
cisco | catalyst_2920 | * | |
cisco | catalyst_2926 | * | |
cisco | catalyst_2926f | * | |
cisco | catalyst_2926gl | * | |
cisco | catalyst_2926gs | * | |
cisco | catalyst_2926t | * | |
cisco | catalyst_2940 | * | |
cisco | catalyst_2948 | * | |
cisco | catalyst_2948-ge-tx | * | |
cisco | catalyst_2948g-l3 | * | |
cisco | catalyst_2950 | * | |
cisco | catalyst_2950_lre | * | |
cisco | catalyst_2955 | * | |
cisco | catalyst_2970 | * | |
cisco | catalyst_2980g | * | |
cisco | catalyst_2980g-a | * | |
cisco | catalyst_3000 | * | |
cisco | catalyst_3200 | * | |
cisco | catalyst_3500_xl | * | |
cisco | catalyst_3550 | * | |
cisco | catalyst_3560 | * | |
cisco | catalyst_3750 | * | |
cisco | catalyst_3750_metro | * | |
cisco | catalyst_3900 | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4000 | * | |
cisco | catalyst_4200 | * | |
cisco | catalyst_4224 | * | |
cisco | catalyst_4232 | * | |
cisco | catalyst_4232-13 | * | |
cisco | catalyst_4500 | * | |
cisco | catalyst_4500 | * | |
cisco | catalyst_4503 | * | |
cisco | catalyst_4506 | * | |
cisco | catalyst_4507r | * | |
cisco | catalyst_4510r | * | |
cisco | catalyst_4840g | * | |
cisco | catalyst_4908g-l3 | * | |
cisco | catalyst_4912g | * | |
cisco | catalyst_4948 | * | |
cisco | catalyst_5000 | * | |
cisco | catalyst_5505 | * | |
cisco | catalyst_5509 | * | |
cisco | catalyst_6000 | * | |
cisco | catalyst_6000 | * | |
cisco | catalyst_6000 | * | |
cisco | catalyst_6000_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6000_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6000_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6000_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_6500 | * | |
cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_6608 | * | |
cisco | catalyst_6624 | * | |
cisco | catalyst_7600 | * | |
cisco | catalyst_7600 | * | |
cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_8500 | * | |
cisco | catalyst_8510csr | * | |
cisco | catalyst_8510msr | * | |
cisco | catalyst_8540csr | * | |
cisco | catalyst_8540msr | * | |
cisco | catalyst_ws-c2924-xl | * | |
cisco | catos | 3.0\(7\) | |
cisco | catos | 4.5\(2\) | |
cisco | catos | 4.5\(3\) | |
cisco | catos | 4.5\(4\) | |
cisco | catos | 4.5\(4b\) | |
cisco | catos | 4.5\(5\) | |
cisco | catos | 4.5\(6\) | |
cisco | catos | 4.5\(7\) | |
cisco | catos | 4.5\(8\) | |
cisco | catos | 4.5\(9\) | |
cisco | catos | 4.5\(10\) | |
cisco | catos | 4.5\(11\) | |
cisco | catos | 4.5\(12\) | |
cisco | catos | 4.5\(13a\) | |
cisco | catos | 5.1 | |
cisco | catos | 5.1\(1\) | |
cisco | catos | 5.1\(1a\) | |
cisco | catos | 5.1\(2a\) | |
cisco | catos | 5.2 | |
cisco | catos | 5.2\(1\) | |
cisco | catos | 5.2\(1a\) | |
cisco | catos | 5.2\(2\) | |
cisco | catos | 5.2\(3\) | |
cisco | catos | 5.2\(4\) | |
cisco | catos | 5.2\(5\) | |
cisco | catos | 5.2\(6\) | |
cisco | catos | 5.2\(7\) | |
cisco | catos | 5.3\(1\)csx | |
cisco | catos | 5.3\(1a\)csx | |
cisco | catos | 5.3\(2\)csx | |
cisco | catos | 5.3\(3\)csx | |
cisco | catos | 5.3\(4\)csx | |
cisco | catos | 5.3\(5\)csx | |
cisco | catos | 5.3\(5a\)csx | |
cisco | catos | 5.3\(6\)csx | |
cisco | catos | 5.4 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 5.4\(2\) | |
cisco | catos | 5.4\(3\) | |
cisco | catos | 5.4\(4\) | |
cisco | catos | 5.5 | |
cisco | catos | 5.5\(1\) | |
cisco | catos | 5.5\(2\) | |
cisco | catos | 5.5\(3\) | |
cisco | catos | 5.5\(4\) | |
cisco | catos | 5.5\(4a\) | |
cisco | catos | 5.5\(4b\) | |
cisco | catos | 5.5\(5\) | |
cisco | catos | 5.5\(6\) | |
cisco | catos | 5.5\(7\) | |
cisco | catos | 5.5\(13\) | |
cisco | catos | 5.5\(19\) | |
cisco | catos | 6.1\(1\) | |
cisco | catos | 6.1\(1a\) | |
cisco | catos | 6.1\(1b\) | |
cisco | catos | 6.1\(1c\) | |
cisco | catos | 6.1\(1d\) | |
cisco | catos | 6.1\(2\) | |
cisco | catos | 6.1\(2.13\) | |
cisco | catos | 6.1\(3\) | |
cisco | catos | 6.2\(0.110\) | |
cisco | catos | 6.2\(0.111\) | |
cisco | catos | 6.2\(3\) | |
cisco | catos | 6.3\(0.7\)pan | |
cisco | catos | 6.3\(4\) | |
cisco | catos | 6.3\(5\) | |
cisco | catos | 6.4\(4a\) | |
cisco | catos | 7.1 | |
cisco | catos | 7.1\(2\) | |
cisco | catos | 7.2\(2\) | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6\(1\) | |
cisco | catos | 7.6\(2\) | |
cisco | ios | 11.2\(8.2\)sa6 | |
cisco | ios | 12.0\(5.2\)xu |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "E7426171-91E9-4369-88F8-469D2D70FF96", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*", "matchCriteriaId": "2795A59A-0157-4EE3-B8B7-946DB7BEACA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*", "matchCriteriaId": "AF84505D-5736-46AC-8723-230EEB80870F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA369237-AEDC-42C2-BAFA-4FE370A28E52", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "70F6296A-4C3C-4A88-B1A4-3EB971339F85", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*", "matchCriteriaId": "D89FB0BB-64D2-4385-9302-FDCB05F92345", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD87934C-057F-4EB3-9B42-2136A69A5AC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*", "matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*", "matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*", "matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*", "matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*", "matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*", "matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*", "matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*", "matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*", "matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*", "matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*", "matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*", "matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*", "matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*", "matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*", "matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*", "matchCriteriaId": "87DF7111-AC30-4B16-8EF9-C21E0280808F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*", "matchCriteriaId": "FC9179DB-C0A8-4B9C-BC17-B9EA55C9B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*", "matchCriteriaId": "F37FE8BD-1434-4F1D-B207-D5C8E48344AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*", "matchCriteriaId": "0F51C943-BBD4-4CAD-8F57-FABECDC469E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*", "matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*", "matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*", "matchCriteriaId": "0EDF42DB-BF41-4C94-8BDB-EB37D90B77EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*", "matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*", "matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*", "matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*", "matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*", "matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*", "matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*", "matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*", "matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*", "matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*", "matchCriteriaId": "4C6A9A84-B0B4-4560-BF84-9C0C675A37E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*", "matchCriteriaId": "8354057B-818A-4BCC-87C3-3EED472B17F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*", "matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*", "matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*", "matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*", "matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*", "matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*", "matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*", "matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*", "matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*", "matchCriteriaId": "D97C1243-BBEB-44AC-96E1-AC46F946EA42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*", "matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID." }, { "lang": "es", "value": "Conmutadores Cisco Catalyst no especificados permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuesti\u00f3n es desconocida; los detalles son obtenidos exclusivamente de BID." } ], "id": "CVE-2005-4258", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-15T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15864" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catalyst_6500 | * | |
cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
cisco | firewall_services_module | * | |
cisco | firewall_services_module | 1.1.2 | |
cisco | catos | 5.4\(1\) | |
cisco | catos | 7.5\(1\) | |
cisco | catos | 7.6\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el M\u00f3dulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda y recarga) mediante una petici\u00f3n HTTP auth para autenticaci\u00f3n TACACS+ o RADIUS." } ], "id": "CVE-2003-1001", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-01-05T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-14 00:07
Modified
2025-04-03 01:03
Severity ?
Summary
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/21896 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21902 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1016843 | ||
cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml | Patch | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/175148 | US Government Resource | |
cve@mitre.org | http://www.osvdb.org/28776 | ||
cve@mitre.org | http://www.phenoelit.de/stuff/CiscoVTP.txt | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/445896/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/445938/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/19998 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3600 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/28925 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21896 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21902 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016843 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/175148 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/28776 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.phenoelit.de/stuff/CiscoVTP.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/445896/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/445938/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19998 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3600 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/28925 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "4944AFEF-D002-4C86-958A-4EB753399FB5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3424FF-8507-4C7A-8858-EA89931A74DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context." }, { "lang": "es", "value": "El VLAN Trunking Protocol (VTP) caracter\u00edstico en Cisco IOS 12.1(19) y CatOS permite a un atacante remoto provocar una denegaci\u00f3n de servicio con el env\u00edo de una actualizaci\u00f3n de VTP con un valor de revisi\u00f3n de 0x7FFFFFFF, el cual se incrementa a 0x80000000 y es interpretado como un n\u00famero negativo en un contexto de se\u00f1ales." } ], "id": "CVE-2006-4775", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-14T00:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21896" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21902" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016843" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/175148" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/28776" }, { "source": "cve@mitre.org", "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19998" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3600" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/175148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/28776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phenoelit.de/stuff/CiscoVTP.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }