cvelist/2006/4xxx/CVE-2006-4430.json

82 lines
2.5 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2006-4430",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/408603/30/0/threaded"
},
{
"url" : "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
},
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/444424/100/0/threaded"
},
{
"url" : "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
},
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/444737/100/0/threaded"
},
{
"url" : "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
},
{
"url" : "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
},
{
"url" : "http://www.securityfocus.com/bid/19726"
}
]
}
}