René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

178 lines
6.1 KiB
JSON

{
"id": "CVE-2009-1154",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2009-08-21T17:30:00.203",
"lastModified": "2009-08-21T17:30:00.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS XR 3.8.1 and earlier allows remote attackers to cause a denial of service (process crash) via a long BGP UPDATE message, as demonstrated by a message with many AS numbers in the AS Path Attribute."
},
{
"lang": "es",
"value": "Cisco IOS XR 3.8.1 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (caida de proceso) mediante un mensaje BGP UPDATE, como se ha demostrado con un mensaje con muchos n\u00fameros AS en el AS Path Attribute."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8.1",
"matchCriteriaId": "1A71883C-A3DF-4FB3-8BA9-61A0E4DFD2F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "00DA2581-F618-4F2A-AB65-DA23DF51AF89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81797938-F953-42BE-B287-AA48B9860AF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "92AED038-C73F-4499-B064-F01D80DB0C64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7A249B-AF69-47D0-B6DE-968B4CD0BA42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F15240-6323-4766-801A-D887F3EA8A6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D99DC1CF-78DC-4E59-98BA-DD84702D6467"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9FA754-E3D2-4D80-8F4B-41139973D9FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F497A05C-2FC5-427D-8036-2476ACA956C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2252E7B0-9112-4E9E-8CF4-4EC53C630CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1131A524-AA7A-4C94-9FFE-54546EA7D2CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46D1A634-D39C-4305-8915-4AA289FB68EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21BAB799-3150-46D8-AEA3-9FCC73203221"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99042285-94AC-4C57-8EAA-EE63C678A94A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E752AA9-CC1C-44B6-A916-A3C76A57F05C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71CBE50E-9BD3-4F74-8C7A-BE4905090EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96F48419-AF66-4B50-ACBF-9E38287A64FA"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1022756",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af150f.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}