mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
619 lines
26 KiB
JSON
619 lines
26 KiB
JSON
{
|
|
"id": "CVE-2011-0394",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2011-02-25T12:00:19.213",
|
|
"lastModified": "2017-08-17T01:33:28.477",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje Skinny Client Control Protocol (SCCP) manipulado, tambi\u00e9n conocido como error ID CSCtg69457 y CSCtl84952."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "8.3\\(1\\)",
|
|
"matchCriteriaId": "9D082A4A-1D97-4077-99AE-B81925018379"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D382B567-5B98-4F7B-921C-2BEB8935B958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "879AD6E2-419C-4B39-B5C2-CB5811C2DFE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03A79B2D-753E-41A0-A232-00D2548AB445"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2656E1E1-F074-4E7C-8070-2A76CE1F29B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7555CFDC-302B-4E28-BB0C-793A3AD50714"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B19B9687-81B2-4A92-8FC7-78112A633421"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2A44304-4EC2-4911-9617-6CD8586BAA92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0F1A991-3FEC-4C7A-9B52-14C19BD09E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A457D2F0-4C89-4864-9B00-5B34B49CF25E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4069F9B-C0F5-4DB7-B018-94A8B00DDEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD66E435-9958-4B71-A32B-82527F4B7BD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09ACA6E4-5B38-41DE-8148-4DE4273ABE79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D45C78DA-736B-42BF-8EE7-86B612DE02D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AED756A-77AE-4A36-8426-63D260CC7469"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D129D646-99B1-4C39-B901-C0AB173D3F7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11437628-A2F3-4255-9725-130BF38475A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "518C7568-BF4C-4172-9150-B47CC180BAE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC727362-2975-4DE8-A787-41F4702489F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE547457-5233-488F-B304-C12EDDB6ECF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD8598B0-4BC9-4C58-A3D3-9DD7AB5D3493"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D09079F5-6D38-4893-BF4C-8294C6D84D19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF0A5E51-A647-406B-B7F4-6F0352B75BAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80E6209A-F60A-4472-9E71-770B83C25371"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A144AF4F-B466-4CB9-91B8-33807D6111D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "170192CB-F3D5-4A0C-BA9D-08FA04539D8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D97A079F-502C-41BE-8D95-347F0B267ED7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A26EFCCF-79CE-4939-8875-AE21C6C5ED24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB53EDB4-BC31-42E9-AA06-B8DA6C985A3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1180F84F-F1D7-432A-9574-2D647E83923E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "616E39E8-A880-44F5-9E87-C27E550681BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3766455-DBBA-47E6-87F2-EDC2A3282841"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE22B734-44C9-4906-9413-E822060D31B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66F36A45-7F45-4AA9-B36A-0746ECA9F3EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16C27FC7-0837-4934-8411-055CB35FB0B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D6CDF51-AB6B-4736-93E0-555AF5135422"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A9DF93C-74F4-4767-8CC2-ADC8F9658638"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "573787DD-3DB1-485E-95E1-3FE6CB9E1BDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF0B1B96-9510-426D-8B89-D4F58DFDE911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06EF7E91-5E4E-46B5-8BE8-A40CFF2BE4CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7BE14B2-25ED-4753-A5C8-6E0F1249ACAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97CB2D92-D8C2-4DAA-9586-BCE5F3CA43A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EA05613-C5B5-4A93-B927-2FD874837BC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "096188EC-72DF-4EC1-8B3A-8720919F5A08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A2253C2-B2AA-4FAB-924B-76DB4EFB11BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3CC32A7-F0A1-45DA-A028-5C3F796E986E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A59CCE8-4A18-4FF4-BD81-2223E78B327A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C32BEE04-36F6-44B2-9735-43085DB9FA1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328AA1BC-FE79-4FA7-8C5A-C9CAB34506BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EDCF4C3-1DFD-4273-BD41-1C7DF475D1B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B84AB0E6-0CAF-4A93-9C9E-0BB28D3D8ACC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AF7472D-1E37-4F21-8A33-ADDD00666FB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4064372B-D5C6-4EE7-B227-919DA61502CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE971B52-825B-4DA3-9585-ED5BE84F3795"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65660DBC-2FE1-470F-9EA6-9BB901B8E4B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEC19E9A-B38B-4BB5-9D0B-0E9BEAA52B04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96FA6AA6-6224-4FBA-B995-9F249DF042A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA9EDACF-992A-46BB-8D78-7E9852755201"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE8E3E70-3BDB-49B7-A2E0-BA8F2EA50320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DF92CAB-E480-448E-B16E-29B8760C6621"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39983B88-A340-4712-9E5C-C3D492DDF09C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E29A007-4664-4822-AC78-7C0153417D9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "822A8177-A69D-495E-9437-E5567A27F60D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1226F8D6-7402-457B-8AEC-7164D735ECF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04F7CD17-7EAC-4B77-8F59-8EB5362091DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97CC4932-94B6-447E-8294-D6732B46CB41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E03AD49-1267-4866-A059-DE97EA79D769"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "889F34A9-81CD-4381-9708-A2481C95FE21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26E8B157-67EF-4DFB-BFBB-7794A048E43C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/46518",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1025108",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1025109",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0493",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0494",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |