mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
310 lines
11 KiB
JSON
310 lines
11 KiB
JSON
{
|
|
"id": "CVE-2010-0581",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2010-03-25T21:00:00.827",
|
|
"lastModified": "2010-04-13T05:43:31.063",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz89904, the \"SIP Packet Parsing Arbitrary Code Execution Vulnerability.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en la implementaci\u00f3n SIP en Cisco IOS v12.3 y v12.4, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un mensaje SIP mal formado. Tambi\u00e9n conocido como Bug ID CSCsz89904."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89B19F2B-1D89-42FC-89A7-737D8109EB1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "237F6EDD-AB47-4768-9C75-C0B03E23696B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC90BE87-EB54-46F8-A1FD-8F4E553C69F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E67621EA-25D8-47C2-ADEA-512E38F2FFE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94E1421B-2B86-41B2-9288-59780E081337"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D910556-9518-45C5-9891-1541760B0920"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1023744",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20065",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |