130 lines
3.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-0535",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2017-08-08T01:29:38.040",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device instability) via \"SSH credentials that attempt to change the authentication method,\" aka Bug ID CSCsm14239."
},
{
"lang": "es",
"value": "Una vulnerabilidad no especificada en el servidor SSH en (1) Cisco Service Control Engine (SCE) versiones anteriores a 3.1.6, y (2) Icon Labs Iconfidant SSH versiones anteriores a 2.3.8, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (inestabilidad del dispositivo) por medio de \"SSH credentials that attempt to change the authentication method,\" tambi\u00e9n se conoce como ID de Bug CSCsm14239."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:service_control_engine:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.5",
"matchCriteriaId": "8F2AA0D7-4859-4DDB-87C9-AC92EEE85BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:icon-labs:iconfidant_ssh:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.7",
"matchCriteriaId": "1863D250-A98A-48FB-AFD1-8A73FC6F18CF"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1020074",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.icon-labs.com/news/read.asp?newsID=77",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/626979",
"source": "ykramarz@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/29316",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29609",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1604/references",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1774/references",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42567",
"source": "ykramarz@cisco.com"
}
]
}