2024-12-08 03:06:42 +00:00

235 lines
6.7 KiB
JSON

{
"id": "CVE-2007-0962",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-16T00:28:00.000",
"lastModified": "2024-11-21T00:27:10.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
},
{
"lang": "es",
"value": "Cisco PIX 500 y ASA 5500 Series Security Appliances 7.x versiones anteriores a 7.0(4.14), 7.1 versiones anteriores a 7.1(2.1), y el FWSM 2.x versiones anteriores a 2.3(4.12) y 3.x versiones anteriores a 3.1(3.24), cuando \"inspect http\" est\u00e1 habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) mediante tr\u00e1fico HTTP mal-formado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:firewall_services_module:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E9A8528D-DF6A-4493-A77E-CBF08359F2E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F90E9070-781D-4D3D-98EB-5B6DB9D3C75E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "891B8FA4-B602-42C5-A94F-8C60BBF7A7D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "856917BD-179B-4C43-8EA6-034254720B63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B009CCE4-908C-4830-B0E0-7B4CB33280F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "640CDC78-22D3-4E60-8D36-F088D8DB27DA"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/33055",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/24160",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24180",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1017651",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/22561",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/22562",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1017652",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0608",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/33055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/24160",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/24180",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1017651",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/22561",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/22562",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1017652",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0608",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}