mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
477 lines
21 KiB
JSON
477 lines
21 KiB
JSON
{
|
|
"id": "CVE-2011-3304",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2011-10-06T10:55:05.643",
|
|
"lastModified": "2017-08-29T01:30:09.693",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.2 anterior a v7.2(5.3), v8.0 antereior a v8.0(5.25), v8.1 anterior a v8.1(2.50), v8.2 anterior a v8.2(5.11), v8.3 anterior a v8.3(2.23), v8.4 anterior a v8.4(2), y v8.5 anterior a v8.5(1.1) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s del tr\u00e1fico MSN Instant Messenger manipulado, tambi\u00e9n conocido como Bug ID CSCtl67486."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D382B567-5B98-4F7B-921C-2BEB8935B958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "879AD6E2-419C-4B39-B5C2-CB5811C2DFE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD901616-28DF-4584-837A-19EF6E69BCC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03A79B2D-753E-41A0-A232-00D2548AB445"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2656E1E1-F074-4E7C-8070-2A76CE1F29B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7555CFDC-302B-4E28-BB0C-793A3AD50714"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B19B9687-81B2-4A92-8FC7-78112A633421"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1A761E3-4787-4C2D-B53B-70470484DAE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2A44304-4EC2-4911-9617-6CD8586BAA92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3879CDB0-ACA1-4696-B282-EB31EE397C99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC9F7548-DCDF-4B09-889E-7C21DB6C18BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0F1A991-3FEC-4C7A-9B52-14C19BD09E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A457D2F0-4C89-4864-9B00-5B34B49CF25E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4069F9B-C0F5-4DB7-B018-94A8B00DDEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD66E435-9958-4B71-A32B-82527F4B7BD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09ACA6E4-5B38-41DE-8148-4DE4273ABE79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D45C78DA-736B-42BF-8EE7-86B612DE02D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AED756A-77AE-4A36-8426-63D260CC7469"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D129D646-99B1-4C39-B901-C0AB173D3F7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11437628-A2F3-4255-9725-130BF38475A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "518C7568-BF4C-4172-9150-B47CC180BAE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC727362-2975-4DE8-A787-41F4702489F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A26EFCCF-79CE-4939-8875-AE21C6C5ED24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EB53EDB4-BC31-42E9-AA06-B8DA6C985A3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1180F84F-F1D7-432A-9574-2D647E83923E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "616E39E8-A880-44F5-9E87-C27E550681BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3766455-DBBA-47E6-87F2-EDC2A3282841"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE22B734-44C9-4906-9413-E822060D31B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66F36A45-7F45-4AA9-B36A-0746ECA9F3EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16C27FC7-0837-4934-8411-055CB35FB0B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D6CDF51-AB6B-4736-93E0-555AF5135422"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A9DF93C-74F4-4767-8CC2-ADC8F9658638"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "573787DD-3DB1-485E-95E1-3FE6CB9E1BDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF0B1B96-9510-426D-8B89-D4F58DFDE911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06EF7E91-5E4E-46B5-8BE8-A40CFF2BE4CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7BE14B2-25ED-4753-A5C8-6E0F1249ACAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97CB2D92-D8C2-4DAA-9586-BCE5F3CA43A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "074065FF-390F-423B-A38B-6342920DCD12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9BA966C-848D-4624-B83A-462DD3607F55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98C41484-23AF-4724-A4C6-518CDF4F3517"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EA05613-C5B5-4A93-B927-2FD874837BC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "096188EC-72DF-4EC1-8B3A-8720919F5A08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A2253C2-B2AA-4FAB-924B-76DB4EFB11BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3CC32A7-F0A1-45DA-A028-5C3F796E986E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A59CCE8-4A18-4FF4-BD81-2223E78B327A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C32BEE04-36F6-44B2-9735-43085DB9FA1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88C8DF80-63E3-4F74-A998-91406C997637"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F01BB48-05B1-4816-A7D3-D7D230E5FA47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39CC9D80-E4B4-4147-B7AD-E36003B37420"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DB106E8-8844-451D-AA91-0197ECC4B451"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "328AA1BC-FE79-4FA7-8C5A-C9CAB34506BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EDCF4C3-1DFD-4273-BD41-1C7DF475D1B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B84AB0E6-0CAF-4A93-9C9E-0BB28D3D8ACC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AF7472D-1E37-4F21-8A33-ADDD00666FB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF65DC1B-9B94-40A2-9934-AB40324CDC12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4064372B-D5C6-4EE7-B227-919DA61502CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE971B52-825B-4DA3-9585-ED5BE84F3795"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65660DBC-2FE1-470F-9EA6-9BB901B8E4B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEC19E9A-B38B-4BB5-9D0B-0E9BEAA52B04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96FA6AA6-6224-4FBA-B995-9F249DF042A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDA57E19-ABED-472D-9BB3-ECDE9BD19046"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "375DF649-0416-4697-B3E7-5BECFB92BB33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9175E2E6-29D7-45A6-AE21-1C4D5F44C3F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA9EDACF-992A-46BB-8D78-7E9852755201"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE8E3E70-3BDB-49B7-A2E0-BA8F2EA50320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DF92CAB-E480-448E-B16E-29B8760C6621"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A311E1C-A154-4162-8392-A5C83006F378"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD33835E-EB26-4D42-970E-BA53CDE24F7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DA54B49-D405-4414-AAF2-FACFE7A7E9CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C344A669-277A-42FD-B41C-A9EB8A7CDB37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80B6E036-F6B4-44C2-A0BF-1D54F794D276"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F0E04B5-EF54-4F5B-BE0B-1CF84B36C099"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC188EE7-CFB6-4231-8400-AD6AAA888B45"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/49952",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |