{ "id": "CVE-2007-4291", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-09T21:17:00.000", "lastModified": "2017-09-29T01:29:15.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with Proxy Unregistration and (3) CSCsg70474; and a malformed Real-time Transport Protocol (RTP) packet, which causes a device crash, as identified by (4) CSCse68138, related to VOIP RTP Lib, and (5) CSCse05642, related to I/O memory corruption." }, { "lang": "es", "value": "Cisco IOS 12.0 hasta 12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante (1) un paquete MGCP mal formado, que provoca un cuelgue de dispositivo, tambi\u00e9n conocido como CSCsf08998; un paquete H.323 mal formado que causa una ca\u00edda de dispositivo, como se identific\u00f3 en (2) CSCsi60004 con Proxy Unregistration y (3) CSCsg70474; y un paquete Real-time Transport Protocol (RTP) mal formado, que provoca una ca\u00edda de dispositivo, como se identific\u00f3 en (4) CSCse68138, relativo a VOIP RTP Lib, y (5) CSCse05642, relativo a corrupci\u00f3n de memoria de E/S." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09" } ] } ] } ], "references": [ { "url": "http://osvdb.org/36677", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/36678", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/36679", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/36680", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/36681", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/26363", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1018533", "source": "cve@mitre.org" }, { "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080899653.shtml", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/25239", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2007/2816", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35903", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35904", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35905", "source": "cve@mitre.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5570", "source": "cve@mitre.org" } ] }