mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
800 lines
30 KiB
JSON
800 lines
30 KiB
JSON
{
|
|
"id": "CVE-2018-14880",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2019-10-03T16:15:12.210",
|
|
"lastModified": "2020-01-20T13:15:14.437",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr()."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El analizador OSPFv3 en tcpdump versiones anteriores a 4.9.3, presenta una lectura excesiva del b\u00fafer en la funci\u00f3n print-ospf6.c:ospf6_print_lshdr()."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-125"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "4.9.3",
|
|
"matchCriteriaId": "CA59BD9C-6C0C-4584-A8CC-8C652E9D36AF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.15.2",
|
|
"matchCriteriaId": "F15588EA-D854-4694-97C6-53D9AA8B6F2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.2.0",
|
|
"versionEndIncluding": "5.4.0",
|
|
"matchCriteriaId": "14A4E46D-F0DB-4201-9102-EC89FACBE780"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndIncluding": "6.1.0",
|
|
"matchCriteriaId": "F37D18F2-8C6A-4557-85DC-2A751595423C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B589C35-55F2-4D40-B5A6-8267EE20D627"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "85EE39BF-86AA-498B-BF51-EDCD7BD01376"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "6FCB6C17-33AC-4E5E-8633-7490058CA51F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "FCBAF5C1-3761-47BB-AD8E-A55A64D33AF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "D6A53E3C-3E09-4100-8D5A-10AD4973C230"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "C6917369-D3C2-42EB-B73B-F86CE2F17401"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "151ED6D1-AA85-4213-8F3A-8167CBEC4721"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "925049D0-082E-4CED-9996-A55620A220CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "FCAE28C2-0ADD-4FD0-A520-EFB764164DD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "596A35D8-3644-4C45-99AC-4D201F170B83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "5D5AA99B-08E7-4959-A3B4-41AA527B4B22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "6D87C038-B96D-4EA8-AB03-0401B2C9BB24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "36A213C6-D6E4-4F38-989D-81D3DFC11829"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "AB5A624E-40A1-4F75-8B9A-FA56510C19EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "9DC86A5F-C793-4848-901F-04BFB57A07F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "0772A366-87B9-40EC-9F63-AE0FF0EF5002"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "037C035C-9CFC-4224-8264-6132252D11FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "59D9F39B-206B-4E76-A811-1CAA705A60EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "8A53C692-D353-42E3-9148-F850DA11884F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "AE66A673-75EF-4AB3-AD4D-A1E70C7EFB08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "70099A38-3B84-4C40-8590-BE6C8F7C21A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "A35AC237-573B-4309-87EF-3945FA2449BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "46712630-407A-4E61-B62F-3AB156353A1D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "1DE40473-ABAE-4D91-8EBB-FB5719E107F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "DA776514-AF68-4292-931E-290310EB0939"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "EFFCCCFF-8B66-4C8B-A99A-32964855EF98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "0D879CE9-E793-41A5-8C20-9BE90BCB012C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "448BB033-AE0F-46A0-8E98-3A6AE36EADAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "5B85324E-B26B-4B31-B4D0-43438546A411"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "96E945EE-A623-4775-83B9-4CF81B7EA70F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "945A19E8-51EB-42FE-9BF1-12DAC78B5286"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "DC39F6EE-478A-4638-B97D-3C25FD318F3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "18B5A918-F9AA-4889-94A7-33E6E54CF383"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "92484170-2E91-45F6-9789-B0DF3F5E6260"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "FB07E847-6083-4CC8-8A62-6B9744B87088"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "5C556587-6963-49CF-8A2B-00431B386D78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "EF606356-8191-478D-AF60-D48A408CD9ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "0A16FE69-A466-4FA6-BDDA-794C9F2B36FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "B7725810-66D2-4460-A174-9F3BFAD966F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "0620AA57-83D1-41E6-8ABB-99F3FABB10F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "572B1078-60C4-4A71-A0F4-2E2F4FBC4102"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "FA3E37E6-64B9-4668-AC01-933711E1C934"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "EFD760FE-4347-4D36-B5C6-4009398060F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "BF552D91-612A-43E1-B2D6-02E2515FEA22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "C95403E8-A078-47E8-9B2F-F572D24C79EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "43581457-5C55-4B31-BEFA-4B59B2744BB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "65B76F53-7D8B-477E-8B6E-91AC0A9009FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "57A92EE2-FFC9-45C9-9454-7DFAB1F7EE11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "EC6612AB-E46B-4A8B-9B3E-C711D8C27962"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.5.2",
|
|
"versionEndIncluding": "11.6.5",
|
|
"matchCriteriaId": "5FAB378B-D08A-4B50-BD7D-51F9B461FED5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.5",
|
|
"matchCriteriaId": "69338CB1-B6E2-44E7-BEC1-6B9EAD560C8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.3",
|
|
"matchCriteriaId": "9F8860F9-2599-4463-AD42-7AF1FD64819B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.0.0",
|
|
"versionEndIncluding": "14.1.2",
|
|
"matchCriteriaId": "F2ADF37B-FCEB-4735-82D9-4241E3A4DE64"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndIncluding": "15.0.1",
|
|
"matchCriteriaId": "BF378F37-554E-498A-8471-48F7544A231F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5F5FEE7-059A-4A9B-BCCD-18F0AA435040"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3CE7526-9630-48EF-81FB-44904AF0653F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.0.0",
|
|
"versionEndIncluding": "5.1.0",
|
|
"matchCriteriaId": "7243F50D-6EF8-4702-92C2-F512DC8E5C00"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2019/Dec/26",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Release Notes",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://seclists.org/bugtraq/2019/Dec/23",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://seclists.org/bugtraq/2019/Oct/28",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20200120-0001/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT210788",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K56551263?utm_source=f5support&utm_medium=RSS",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://usn.ubuntu.com/4252-1/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://usn.ubuntu.com/4252-2/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.debian.org/security/2019/dsa-4547",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |