mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
423 lines
18 KiB
JSON
423 lines
18 KiB
JSON
{
|
|
"id": "CVE-2011-0393",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2011-02-25T12:00:19.167",
|
|
"lastModified": "2017-08-17T01:33:28.383",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.12), v7.1 y v7.2 anterior a v7.2(5.2), v8.0 anterior a v8.0 (5.21), v8.1 anterior a v8.1 (2.49), v8.2 anterior a v8.2 (3.6), y v8.3 anterior a v8.3 (2.7); dispositivos Cisco PIX Security Appliances Serie 500 cuando el modo de cortafuegos transparente se configura pero IPv6 no est\u00e1 configurado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (packet buffer exhaustion y corte del dispositivo) a trav\u00e9s de tr\u00e1fico IPv6, tambi\u00e9n conocido como error ID CSCtj04707."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.3\\(1\\)",
|
|
"matchCriteriaId": "9D082A4A-1D97-4077-99AE-B81925018379"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D382B567-5B98-4F7B-921C-2BEB8935B958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "879AD6E2-419C-4B39-B5C2-CB5811C2DFE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03A79B2D-753E-41A0-A232-00D2548AB445"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2656E1E1-F074-4E7C-8070-2A76CE1F29B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7555CFDC-302B-4E28-BB0C-793A3AD50714"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B19B9687-81B2-4A92-8FC7-78112A633421"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2A44304-4EC2-4911-9617-6CD8586BAA92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0F1A991-3FEC-4C7A-9B52-14C19BD09E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A457D2F0-4C89-4864-9B00-5B34B49CF25E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4069F9B-C0F5-4DB7-B018-94A8B00DDEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD66E435-9958-4B71-A32B-82527F4B7BD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09ACA6E4-5B38-41DE-8148-4DE4273ABE79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D45C78DA-736B-42BF-8EE7-86B612DE02D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AED756A-77AE-4A36-8426-63D260CC7469"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D129D646-99B1-4C39-B901-C0AB173D3F7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11437628-A2F3-4255-9725-130BF38475A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "518C7568-BF4C-4172-9150-B47CC180BAE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC727362-2975-4DE8-A787-41F4702489F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE547457-5233-488F-B304-C12EDDB6ECF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD8598B0-4BC9-4C58-A3D3-9DD7AB5D3493"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D09079F5-6D38-4893-BF4C-8294C6D84D19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF0A5E51-A647-406B-B7F4-6F0352B75BAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80E6209A-F60A-4472-9E71-770B83C25371"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A144AF4F-B466-4CB9-91B8-33807D6111D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "170192CB-F3D5-4A0C-BA9D-08FA04539D8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D97A079F-502C-41BE-8D95-347F0B267ED7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A26EFCCF-79CE-4939-8875-AE21C6C5ED24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB53EDB4-BC31-42E9-AA06-B8DA6C985A3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1180F84F-F1D7-432A-9574-2D647E83923E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "616E39E8-A880-44F5-9E87-C27E550681BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3766455-DBBA-47E6-87F2-EDC2A3282841"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE22B734-44C9-4906-9413-E822060D31B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66F36A45-7F45-4AA9-B36A-0746ECA9F3EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16C27FC7-0837-4934-8411-055CB35FB0B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D6CDF51-AB6B-4736-93E0-555AF5135422"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A9DF93C-74F4-4767-8CC2-ADC8F9658638"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "573787DD-3DB1-485E-95E1-3FE6CB9E1BDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF0B1B96-9510-426D-8B89-D4F58DFDE911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06EF7E91-5E4E-46B5-8BE8-A40CFF2BE4CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7BE14B2-25ED-4753-A5C8-6E0F1249ACAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97CB2D92-D8C2-4DAA-9586-BCE5F3CA43A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EA05613-C5B5-4A93-B927-2FD874837BC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "096188EC-72DF-4EC1-8B3A-8720919F5A08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A2253C2-B2AA-4FAB-924B-76DB4EFB11BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3CC32A7-F0A1-45DA-A028-5C3F796E986E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A59CCE8-4A18-4FF4-BD81-2223E78B327A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C32BEE04-36F6-44B2-9735-43085DB9FA1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328AA1BC-FE79-4FA7-8C5A-C9CAB34506BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EDCF4C3-1DFD-4273-BD41-1C7DF475D1B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B84AB0E6-0CAF-4A93-9C9E-0BB28D3D8ACC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AF7472D-1E37-4F21-8A33-ADDD00666FB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4064372B-D5C6-4EE7-B227-919DA61502CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE971B52-825B-4DA3-9585-ED5BE84F3795"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65660DBC-2FE1-470F-9EA6-9BB901B8E4B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEC19E9A-B38B-4BB5-9D0B-0E9BEAA52B04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96FA6AA6-6224-4FBA-B995-9F249DF042A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA9EDACF-992A-46BB-8D78-7E9852755201"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE8E3E70-3BDB-49B7-A2E0-BA8F2EA50320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DF92CAB-E480-448E-B16E-29B8760C6621"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1025108",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0493",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65589",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |