René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.5 KiB
JSON

{
"id": "CVE-2008-2057",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2018-10-30T16:25:38.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet."
},
{
"lang": "es",
"value": "Motor de inspecci\u00f3n Instant Messenger en Cisco Adaptive Security Appliance ASA) y Cisco PIX security appliance 7.2.x anterior 7.2(4), 8.0.x anterior a 8.0(3)10, y 8.1.x anterior a 8.1(1)2, permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trasv\u00e9s de un paquete manipulado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "096188EC-72DF-4EC1-8B3A-8720919F5A08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C32BEE04-36F6-44B2-9735-43085DB9FA1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:pix_security_appliance:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF15BCE-C6B3-47CB-B716-51B95398A253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:pix_security_appliance:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8681FC-05B5-4AE3-A9CF-51879254404E"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1020180",
"source": "ykramarz@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020181",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
"source": "ykramarz@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42837",
"source": "ykramarz@cisco.com"
}
]
}