mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
359 lines
13 KiB
JSON
359 lines
13 KiB
JSON
{
|
|
"id": "CVE-2000-0345",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2000-05-03T04:00:00.000",
|
|
"lastModified": "2008-09-10T19:04:11.430",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "327028C0-D9F3-46A3-B2CC-4630FE18C43E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B36FF40E-EF0A-4149-A35D-8D765EBFFAE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51382DA5-4EBC-44DC-951F-32FC7AA719A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BA2A1FD-11A3-403A-B5A6-0220CA18EC99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3493F361-0C8A-4B66-AF6B-926E2D66BBEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "841513AE-7521-4670-8438-AE5EB70F3A48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF3E8F79-6177-453C-99B5-BC9BC7670869"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B244655-A6A5-40D0-A0D1-34C814DA9389"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA064273-1A6E-4303-BAAB-F585691EF9BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A8158E2-0DFE-479B-B085-9775FF700C85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29CA3070-B75D-4E56-A338-E10F5509394E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17DE2319-19D9-4C02-80B4-0A6AAD853867"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F169E322-3D72-4F86-BD5F-74589E5DD823"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBA5D334-6DB8-44B0-92EF-8694BBE79A9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "099CFED1-0E2F-46B2-8136-BFA146EB9A00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "754F06BF-EB7D-4DAD-BF5D-7DF2619A7499"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "047F9781-38B8-488C-B999-A3CA6BDB639C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E3586C0-64AF-4584-8F56-7E0756B4A521"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_2500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "317EF7FA-B744-487C-AEB6-4516CF03F9B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_2600:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3B03AEF-EACD-4B3D-AA1E-EADC344C02BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_3600:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0460513-094F-4F99-B0EB-7AA484D21920"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_4000:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "446980C5-E512-475C-B255-86A8726A67D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "637F3047-DF5B-481D-8595-B54B076A5CD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:router_7500:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA7F3C4B-378B-4431-B4AF-09D95354363E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/1161",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail@securityfocus.com",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |