mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
151 lines
4.6 KiB
JSON
151 lines
4.6 KiB
JSON
{
|
|
"id": "CVE-2009-2862",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2009-09-28T19:30:01.217",
|
|
"lastModified": "2022-06-02T17:23:04.113",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Object Groups for Access Control Lists (ACLs) feature in Cisco IOS 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to bypass intended access restrictions via crafted requests, aka Bug IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122, and CSCsu50252."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los \"Object Groups\" (grupos de objetos) para la funcionalidad de listas de control de acceso (ACLs) en Cisco IOS v12.2XNB, v12.2XNC, v12.2XND, v12.4MD, v12.4T, v12.4XZ y v12.4YA permiten a los usuarios remotos evitar las restricciones establecidas a trav\u00e9s de peticiones modificadas. Tambi\u00e9n conocido como IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122 y CSCsu50252."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17AA0C3D-7C96-4D2E-91E5-232536245ABF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D57ACB3-4ADC-4FBE-BA46-395F277B9997"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2916FA5-1FFF-48FB-A079-693AD3444CC1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4963A243-74FA-43AD-9645-C9FAD527A6E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/58338",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Broken Link"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18876",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8119.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/36495",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1022933",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Broken Link",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/2759",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Permissions Required"
|
|
]
|
|
}
|
|
]
|
|
} |