2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0053" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2009-01-16T21:30:03.407" ,
"lastModified" : "2011-03-08T03:17:49.813" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "PXE Encryption in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to obtain the decryption key via unspecified vectors, related to a \"logic error.\""
} ,
{
"lang" : "es" ,
"value" : "Cifrado PXE en Cisco IronPort Encryption Appliance v6.2.4 anterior a v6.2.4.1.1, v6.2.5, v6.2.6, v6.2.7 anterior a v6.2.7.7, v6.3 anterior a v6.3.0.4, y v6.5 anterior a v6.5.0.2; y Cisco IronPort PostX v6.2.1 anterior a v6.2.1.1 y v6.2.2 anterior a v6.2.2.3; permite a atacantes remotos obtener la clave de descifrado mediante vectores no especificados, relacionados con un \"error l\u00f3gico\"."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-310"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41DF7FFA-66B5-45E8-B57E-FB307E4DB8CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3CAA06A-C849-49B9-B6B7-7E3BF41F705C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6539D9D7-E3DF-475C-B53D-CF11220FBA27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7486F8C6-F2E5-4790-BA3A-FA36CF7A8704"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1262F096-DB00-4D52-894D-3BA812AEF570"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "097FCF52-65CF-4AF5-97BC-8B310610DFB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8A0A514-959C-4017-B0AB-AFC9D0A979E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A06BEC91-C3A6-4590-94A7-EA783A12ABF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF9BCDE5-CEF8-4D25-AE6A-D4AF2B2DFBD0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90A1B821-0FDD-40C8-93FA-06BB895E83D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9EF0B9B-B5D9-4F2D-A4E9-24349747435A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E081B0DF-DBD9-4640-92CC-29920E2A50BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C56BC79D-E974-4881-81E5-335FF216DFA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C7E4C7E-DECE-40B5-AAA4-15964F4EC762"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4686D0A4-85B4-4236-B09A-DA8B554A0523"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CF6D489-B7EA-4705-B136-6B96CC179046"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "391503D9-FE43-4A34-A67D-AB3B52996FA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BACB1F5F-542E-44B2-AF54-6D61294E57A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5EA0DB42-01D6-4B14-934B-23C11CB8D062"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A66E714E-6414-4B3F-ABFB-8DE44F3E7065"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B0BE0FF-376B-4BA4-8CEF-EFCF3BDC1D4C"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/51395" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://secunia.com/advisories/33479" ,
"source" : "ykramarz@cisco.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1021593" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/33268" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0140" ,
"source" : "ykramarz@cisco.com"
}
]
}