cvelist/2006/4xxx/CVE-2006-4983.json

73 lines
2.0 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2006-4983",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cisco NAC allows quarantined devices to communicate over the network with (1) DNS, (2) DHCP, and (3) EAPoUDP, which allows attackers to bypass control methods by tunneling network traffic through one of these protocols."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20060919 White paper release: Bypassing network access control (NAC) systems",
"refsource" : "BUGTRAQ",
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/446421/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "http://www.insightix.com/files/pdf/Bypassing_NAC_Solutions_Whitepaper.pdf",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://www.insightix.com/files/pdf/Bypassing_NAC_Solutions_Whitepaper.pdf"
},
{
"name" : "30977",
"refsource" : "OSVDB",
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/30977"
}
]
}
}