mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
501 lines
19 KiB
JSON
501 lines
19 KiB
JSON
{
|
|
"id": "CVE-2003-1109",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-12-31T05:00:00.000",
|
|
"lastModified": "2018-10-30T16:26:18.060",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "915157AA-15BE-4792-95D8-4D1E1EF34EB7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F38C9EE3-1A86-4930-AEF7-EAC3A2713DF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "742CC70E-68FB-4658-A475-E7BBC5983878"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10CE5741-1569-4B69-B7F7-094F0C6101AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9B4D71A-D418-4E6B-88F7-50833C00236C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDD14702-51AC-46B1-95A3-4AD47A4DCD21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FA8E55E-7E11-4D46-A1BC-B3655906FDF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E16ED18-4EB6-40D5-A857-6398A78693D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "979D4077-A3CB-4134-B180-EF10F01413BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6C96C90-8B2D-4A88-A4B8-FA43332BD8D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C9B3920-D3F1-478F-ADE9-6022763E8740"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BC9CF50-E0F7-4513-B7EB-A2E095D3E194"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1A3E8C4-0E94-4027-ABDE-47A364071D1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07398411-7920-4B52-92C8-3696F49370B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "371FA715-3966-4071-961F-12E691608DB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E2713E8-3E4B-4C60-9ABD-01B962A85A9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5400D72E-CD49-41E7-BA47-33E3AB920320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A44418C-C041-4A98-9D1F-1E7510B9AD1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "474FA3DA-6967-48A6-AAB4-E7C382D3C942"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E319FE1E-8D75-4CA2-8EA9-C1C32C290891"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B82C4003-D2CD-4243-8A8D-B8A9B449D096"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29056463-CDD9-4399-964E-14BDBFF760A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "259BD3FC-FFC5-44B7-8641-917A1BF2E98C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34F414DF-19C3-42BC-B43D-5CF60A3C0991"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E32D7BFD-EC96-464D-81CB-E9CC12C21EC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32421120-BCA2-4218-8CB3-C77452A69295"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B03537E8-D899-44D5-976D-A6E10FF16FF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C4C67B0-81D3-4430-A9F7-6F15C601693E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "520E6B5D-C163-4633-A2DC-D02335838FDA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA145839-3DC4-41C4-96B7-88B8EE87D70E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FC95C37-9102-45C7-813A-15A0ACFF5D5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F8D649D-474E-4661-A68E-517EA3563CAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0FEB158-215B-4C9D-8882-D44EE7F90B60"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1BD8E31-5117-4E79-92A4-5FF08BC8BB60"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "274DF264-D0DE-46DC-A91F-DD53ACE06AAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC678F0D-4307-48B9-8C29-9E85DB756809"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92A9D069-4C88-4BE1-92E3-8A7056DD8825"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ip_phone_7940:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7F39E4B-C895-42E2-A7A7-C7026D17BE0D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ip_phone_7960:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6E77332-1288-409C-8A5F-435E4A866EF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "626E41D2-A5EF-493D-9486-3D9BC3793EAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBA31E4D-2215-4E4A-BCCC-B3D922CB752D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(3.210\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F16AD2C-1CC1-43D9-A944-F67071B62E66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25D16481-CA9A-4B4D-AC9D-3A4F0387FF19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56E4588E-6C1F-4720-8082-0EF299435CB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED24C763-7558-4AC0-AE10-FDA3D3078D27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1.200\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C84CE24E-4ED6-43D0-A234-FBD24D22A8A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72C3E2B4-3A36-44B5-90D3-1BF9FAD98579"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cert.org/advisories/CA-2003-06.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/528719",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/6904",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1006143",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1006144",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1006145",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11379",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |