René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

202 lines
8.1 KiB
JSON

{
"id": "CVE-2017-6745",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-08-07T06:29:00.323",
"lastModified": "2019-10-09T23:29:02.717",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television 3.2(5)ES1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance. The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc39260."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el servidor cach\u00e9 de Cisco Videoscape Distribution Suite (VDS) para Television 3.2(5)ES1 podr\u00eda permitir que un atacante remoto sin autenticar provoque una denegaci\u00f3n de servicio (DoS) en un dispositivo objetivo. Esto se debe a que un exceso de conexiones mapeadas agota los recursos asignados del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de grandes cantidades de tr\u00e1fico de entrada a un dispositivo, con el objetivo de sobrecargar ciertos recursos. Si se tiene \u00e9xito, el dispositivo podr\u00eda recargarse, provocando una denegaci\u00f3n de servicio. Cisco Bug IDs: CSCvc39260."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(5\\)es1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8C50F3-DE69-4810-9C9B-43950B326905"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D322339B-01E5-4AE5-A646-49CE3EB170F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "547B1AE2-7081-4AB3-A3C9-31DBF4B47543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7806199-2882-4166-B5B5-565413723C30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D77783F4-B383-4F83-B173-721452D2C3A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5A091D4E-C9A4-41C1-BA65-5607D6737EAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59AA47AE-E9F2-4CD7-BBE4-5903408C4D90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.5\\(1\\)-cos:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FC6B01-E93C-4B96-BD6B-154D6355EE1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31AF3BB3-5885-4312-9EAC-276C455E3AF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.8\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "299E89B7-2B29-4DB1-8B8A-D98F4AA5E326"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:3.9\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23943C16-7A8B-49FC-95FF-ECA0C738D4CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6663090A-8ED5-47B2-A53F-CAE8EC5A1E63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB802-6352-4BAD-9532-BDF72DB348A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F84055DF-CB8F-4608-AB36-E32E85AED5AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0CFA6A35-DA36-4798-BF2C-6017DC4F0114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4A20369-73B9-4E4B-943B-01A65F2ECB54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:videoscape_distribution_suite_for_television:4.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4238E3F5-C174-4DEF-A0AE-5C38C998EDBA"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/100106",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-vds",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}