mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
386 lines
14 KiB
JSON
386 lines
14 KiB
JSON
{
|
|
"id": "CVE-2007-0648",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-02-01T01:28:00.000",
|
|
"lastModified": "2017-10-11T01:31:38.330",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco IOS despu\u00e9s de las versiones 12.3(14)T, 12.3(8)YC1, 12.3(8)YG y 12.4, con soporte de voz y sin el Session Initiated Protocol (SIP) configurado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante el env\u00edo de un paquete manipulado al puerto 5060/UDP."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D32302AE-54E2-423A-A418-6C7EAE2CDF0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F616AE0-42B4-403B-B610-99DE15EE490D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68A83281-667D-4D1A-9F76-CFF3E5AD560F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65B65738-134F-4C1A-916B-D6CD6365CB43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5331586-8380-4F77-8735-17EC0D0E503A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35536E91-A58D-40F7-A256-34128E64B920"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F69329B-4D37-428E-B467-E3B9314A4D61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9615B275-5748-46CC-8A77-4A9550A39050"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "421CD923-6282-4404-A642-C04E1F57F12F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD4411CB-5EE9-455C-AE90-1770320EFD86"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "593D1680-4883-43FE-A925-B87ED1D2E785"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90769378-BBD1-48D0-921C-A79413B99CE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E0D6801-E9A8-416B-830B-7682A9AF65BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23265E4D-855C-4CCC-A875-DFCBA55B3CB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2EB86291-EB40-4CFD-A424-898EFB3D518B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A10AADAC-4687-4308-8E4F-B7F9549556DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A747987-5218-4C1E-87C4-0675CD4F7A2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B6483CB-7838-45F7-AE28-824AD71172A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04759B1E-8B40-460F-B33F-4E6332CFC31D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08AF3694-9686-444B-8D92-E41D262F74E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5595E7D-3CFD-4FF2-A6BE-59645058C54F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4235428-5E2E-4BCB-98B7-8844B19C7AA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A1E17AB-F645-4636-9337-3158556E85A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86150D11-94D7-43F9-9D19-33778558255F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDC43701-8A3A-42FB-B4F5-566DE59E542E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/23978",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017575",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/438176",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/22330",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0428",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |