mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
93 lines
3.2 KiB
JSON
93 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2011-0935",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2011-04-14T16:55:01.317",
|
|
"lastModified": "2011-04-21T02:33:12.733",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorImpact": "CVSS score derived from:\r\n\r\nhttp://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_2s.html",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funcionalidad de PKI en Cisco IOS v15.0 y v15.1 no impide el almacenamiento en cach\u00e9 permanente de ciertas claves p\u00fablicas, lo que permite evitar la autenticaci\u00f3n a atacantes remotos y tener otros impactos no especificados mediante el aprovechamiento de una relaci\u00f3n IKE en el que una clave que ha sido v\u00e1lida es posteriormente revocada. Vulnerabilidad tambi\u00e9n conocida como Bug ID CSCth82164. Se trata de una vulnerabilidad diferente a CVE-2010-4685.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-310"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/47407",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |