179 lines
6.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2009-1154",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2009-08-21T17:30:00.203",
"lastModified": "2009-08-21T17:30:00.203",
"vulnStatus": "Analyzed",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS XR 3.8.1 and earlier allows remote attackers to cause a denial of service (process crash) via a long BGP UPDATE message, as demonstrated by a message with many AS numbers in the AS Path Attribute."
},
{
"lang": "es",
"value": "Cisco IOS XR 3.8.1 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (caida de proceso) mediante un mensaje BGP UPDATE, como se ha demostrado con un mensaje con muchos n\u00fameros AS en el AS Path Attribute."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8.1",
"matchCriteriaId": "1A71883C-A3DF-4FB3-8BA9-61A0E4DFD2F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00DA2581-F618-4F2A-AB65-DA23DF51AF89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81797938-F953-42BE-B287-AA48B9860AF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "92AED038-C73F-4499-B064-F01D80DB0C64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7A249B-AF69-47D0-B6DE-968B4CD0BA42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F15240-6323-4766-801A-D887F3EA8A6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D99DC1CF-78DC-4E59-98BA-DD84702D6467"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9FA754-E3D2-4D80-8F4B-41139973D9FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F497A05C-2FC5-427D-8036-2476ACA956C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2252E7B0-9112-4E9E-8CF4-4EC53C630CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1131A524-AA7A-4C94-9FFE-54546EA7D2CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46D1A634-D39C-4305-8915-4AA289FB68EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21BAB799-3150-46D8-AEA3-9FCC73203221"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99042285-94AC-4C57-8EAA-EE63C678A94A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E752AA9-CC1C-44B6-A916-A3C76A57F05C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71CBE50E-9BD3-4F74-8C7A-BE4905090EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96F48419-AF66-4B50-ACBF-9E38287A64FA"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1022756",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af150f.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}