René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.7 KiB
JSON

{
"id": "CVE-2015-0610",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2015-02-12T01:59:26.233",
"lastModified": "2017-09-08T01:29:46.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en la caracter\u00edstica object-group ACL en Cisco IOS 15.5(2)T y anteriores permite a atacantes remotos evadir las restricciones de acceso a trav\u00e9s de trafico manipulado de la red que provoca el manejo incorrecto de los tiempos de la conmutaci\u00f3n de procesos y de la conmutaci\u00f3n de Cisco Express Forwarding (CEF), tambi\u00e9n conocido como Bug ID CSCun21071."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"versionEndIncluding": "15.5\\(2\\)t",
"matchCriteriaId": "127644A5-E68D-4154-9D62-430674FA85D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios:15.5t:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D89188-119F-4E89-ACA2-9AAFAC9B9FCC"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37423",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72565",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031732",
"source": "ykramarz@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100807",
"source": "ykramarz@cisco.com"
}
]
}