René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

145 lines
4.5 KiB
JSON

{
"id": "CVE-2008-0536",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2017-08-08T01:29:38.103",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) 3.0.x before 3.0.7 and 3.1.x before 3.1.0, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (management interface outage) via SSH traffic that occurs during management operations and triggers \"illegal I/O operations,\" aka Bug ID CSCsh49563."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el servidor SSH en (1) Cisco Service Control Engine (SCE) versiones 3.0.x anteriores a 3.0.7 y versiones 3.1.x anteriores a 3.1.0, y (2) Icon Labs Iconfidant SSH versiones anteriores a 2.3.8, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (interrupci\u00f3n de la interfaz de administraci\u00f3n) por medio de un tr\u00e1fico SSH que ocurre durante las operaciones de administraci\u00f3n y desencadena \"illegal I/O operations,\" tambi\u00e9n se conoce como ID de error CSCsh49563."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:service_control_engine:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.6",
"matchCriteriaId": "AA9282CB-43A7-44C4-A678-D5C67D3CF310"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:service_control_engine:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47EE0074-7A1C-44C3-AB50-DB1E7D06FF0B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:icon-labs:iconfidant_ssh:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.7",
"matchCriteriaId": "1863D250-A98A-48FB-AFD1-8A73FC6F18CF"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1020074",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.icon-labs.com/news/read.asp?newsID=77",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/626979",
"source": "ykramarz@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/29316",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29609",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1604/references",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1774/references",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42566",
"source": "ykramarz@cisco.com"
}
]
}