2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4794" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-31T05:00:00.000" ,
"lastModified" : "2017-07-20T01:29:24.457" ,
"vulnStatus" : "Modified" ,
"evaluatorSolution" : "Cisco has released advisory cisco-sn-20050524-dns to address this issue. Please see the referenced advisory for further information on obtaining fixes." ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E383F2A-DFCF-47F8-94EE-3563D41EA597"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:ata:186:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BA52BDC-36B9-4C2F-BED4-D6809563C3AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:ata:188:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD6F84BF-48ED-41F1-B237-FF58F4491925"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:subscriber_edge_services_manager:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E86726D1-256E-4F9D-8D3A-DD1F1BD2E165"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ip_phone_7902:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0143975A-5D7B-46F9-8529-D5E3485CF2FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ip_phone_7905:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "460D3CD8-DCBB-41A5-98C4-EE66700DDCE0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:ip_phone_7912:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B31D194B-75A0-4F4F-8738-D4DC06047F02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unity_express:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7583D706-3702-4571-BD2C-527E5337F6E1"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/15472" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1014043" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1014044" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1014045" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1014046" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1015975" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/19003" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/13729" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20712" ,
"source" : "cve@mitre.org"
}
]
}