CVE-2007-0648 (GCVE-0-2007-0648)
Vulnerability from cvelistv5
Published
2007-02-01 01:00
Modified
2024-08-07 12:26
Severity ?
CWE
  • n/a
Summary
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
References
cve@mitre.org http://secunia.com/advisories/23978 Vendor Advisory
cve@mitre.org http://securitytracker.com/id?1017575
cve@mitre.org http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml Vendor Advisory
cve@mitre.org http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml Patch, Vendor Advisory
cve@mitre.org http://www.kb.cert.org/vuls/id/438176 Patch, US Government Resource
cve@mitre.org http://www.securityfocus.com/bid/22330
cve@mitre.org http://www.vupen.com/english/advisories/2007/0428
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/31990
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23978 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1017575
af854a3a-2127-422b-91ae-364da2661108 http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/438176 Patch, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/22330
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/0428
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/31990
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:26:54.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23978",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23978"
          },
          {
            "name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
          },
          {
            "name": "1017575",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017575"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
          },
          {
            "name": "22330",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22330"
          },
          {
            "name": "cisco-sip-packet-dos(31990)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
          },
          {
            "name": "oval:org.mitre.oval:def:5138",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
          },
          {
            "name": "ADV-2007-0428",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0428"
          },
          {
            "name": "VU#438176",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/438176"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23978",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23978"
        },
        {
          "name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
        },
        {
          "name": "1017575",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017575"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
        },
        {
          "name": "22330",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22330"
        },
        {
          "name": "cisco-sip-packet-dos(31990)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
        },
        {
          "name": "oval:org.mitre.oval:def:5138",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
        },
        {
          "name": "ADV-2007-0428",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0428"
        },
        {
          "name": "VU#438176",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/438176"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0648",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23978",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23978"
            },
            {
              "name": "20070131 SIP Packet Reloads IOS Devices Not Configured for SIP",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
            },
            {
              "name": "1017575",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017575"
            },
            {
              "name": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
            },
            {
              "name": "22330",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22330"
            },
            {
              "name": "cisco-sip-packet-dos(31990)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
            },
            {
              "name": "oval:org.mitre.oval:def:5138",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
            },
            {
              "name": "ADV-2007-0428",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0428"
            },
            {
              "name": "VU#438176",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/438176"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0648",
    "datePublished": "2007-02-01T01:00:00",
    "dateReserved": "2007-01-31T00:00:00",
    "dateUpdated": "2024-08-07T12:26:54.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-0648\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-01T01:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS despu\u00e9s de las versiones 12.3(14)T, 12.3(8)YC1, 12.3(8)YG y 12.4, con soporte de voz y sin el Session Initiated Protocol (SIP) configurado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante el env\u00edo de un paquete manipulado al puerto 5060/UDP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32302AE-54E2-423A-A418-6C7EAE2CDF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F616AE0-42B4-403B-B610-99DE15EE490D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A83281-667D-4D1A-9F76-CFF3E5AD560F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B65738-134F-4C1A-916B-D6CD6365CB43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5331586-8380-4F77-8735-17EC0D0E503A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35536E91-A58D-40F7-A256-34128E64B920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69329B-4D37-428E-B467-E3B9314A4D61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9615B275-5748-46CC-8A77-4A9550A39050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421CD923-6282-4404-A642-C04E1F57F12F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4411CB-5EE9-455C-AE90-1770320EFD86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593D1680-4883-43FE-A925-B87ED1D2E785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90769378-BBD1-48D0-921C-A79413B99CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6DF704-8CC8-42C3-83F1-4D38734DEAEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E636DC68-59FE-4BA0-BCFC-4DA97EE17B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0D6801-E9A8-416B-830B-7682A9AF65BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23265E4D-855C-4CCC-A875-DFCBA55B3CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB86291-EB40-4CFD-A424-898EFB3D518B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10AADAC-4687-4308-8E4F-B7F9549556DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A747987-5218-4C1E-87C4-0675CD4F7A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6483CB-7838-45F7-AE28-824AD71172A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04759B1E-8B40-460F-B33F-4E6332CFC31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08AF3694-9686-444B-8D92-E41D262F74E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5595E7D-3CFD-4FF2-A6BE-59645058C54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4235428-5E2E-4BCB-98B7-8844B19C7AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1E17AB-F645-4636-9337-3158556E85A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86150D11-94D7-43F9-9D19-33778558255F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(9\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC43701-8A3A-42FB-B4F5-566DE59E542E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DC543-AC01-4B91-88C7-60C323E35929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF610051-1638-4C1B-9864-11E34EFC4DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB633E6C-025C-4B31-ABE7-8318C813376B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/23978\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017575\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/438176\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22330\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0428\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31990\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23978\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/438176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…