var-200401-0027
Vulnerability from variot

Buffer overflow in the authentication module for Cisco ACNS 4.x before 4.2.11, and 5.x before 5.0.5, allows remote attackers to execute arbitrary code via a long password. Cisco has reported a remotely exploitable buffer overrun in ACNS authentication libraries, which are typically deployed on various Content devices. The following devices running ACNS software versions prior to 4.2.11 or 5.0.5 are affected: Content Routers 4400 series Content Distribution Manager 4600 series Content Engine 500 and 7300 series Content Engine Module for Cisco Routers 2600, 3600 and 3700 series This issue could be potentially exploited to execute arbitrary code on a vulnerable device, resulting in full compromise. Denial of services is another possible consequence of exploitation. Cisco ACNS provides networking solutions for the next generation of Cisco enterprise content. There is a buffer overflow problem in the authentication library of Cisco ACNS. Of course, this problem can also cause the device to deny service

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200401-0027",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "content engine module",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "for_cisco_router_3600_series"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7320_4.1"
      },
      {
        "model": "content engine module",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "for_cisco_router_3700_series"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7320_4.0"
      },
      {
        "model": "content engine module",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "for_cisco_router_2600_series"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7320_3.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "560"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "507"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "content router 4450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_2.2_.0"
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_3.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_2.2_.0"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "content distribution manager 4670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_2.2_.0"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.3"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.9"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.7"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "7320_2.2_.0"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "590_4.0"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "application and content networking software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.3"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_4.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_4.1"
      },
      {
        "model": "content distribution manager 4650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "507_3.1"
      },
      {
        "model": "content distribution manager 4630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "560_3.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router 4450",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router 4430",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "content router 4430",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4450"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "44304.1"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "44304.0"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4430"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3700"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3600"
      },
      {
        "model": "content engine module for cisco router series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2600"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73204.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73204.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73203.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "73202.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5904.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5904.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5903.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5902.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5604.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5604.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5603.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5602.2.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5074.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5074.0"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5073.1"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5072.2.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4670"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46504.1"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46504.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4650"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46304.1"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "46304.0"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4630"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.3"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.9"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.7"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.1"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.3"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.5"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.11"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "BID",
        "id": "9187"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Security bulletin",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0982",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0982",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-7807",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0982",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#352462",
            "trust": 0.8,
            "value": "12.96"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200401-016",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7807",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the authentication module for Cisco ACNS 4.x before 4.2.11, and 5.x before 5.0.5, allows remote attackers to execute arbitrary code via a long password. Cisco has reported a remotely exploitable buffer overrun in ACNS authentication libraries, which are typically deployed on various Content devices. \nThe following devices running ACNS software versions prior to 4.2.11 or 5.0.5 are affected:\nContent Routers 4400 series\nContent Distribution Manager 4600 series\nContent Engine 500 and 7300 series\nContent Engine Module for Cisco Routers 2600, 3600 and 3700 series\nThis issue could be potentially exploited to execute arbitrary code on a vulnerable device, resulting in full compromise.  Denial of services is another possible consequence of exploitation. Cisco ACNS provides networking solutions for the next generation of Cisco enterprise content. There is a buffer overflow problem in the authentication library of Cisco ACNS. Of course, this problem can also cause the device to deny service",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      },
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "BID",
        "id": "9187"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "9187",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "10409",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#352462",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "13945",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20031210 VULNERABILITY IN AUTHENTICATION LIBRARY FOR ACNS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "db": "BID",
        "id": "9187"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "id": "VAR-200401-0027",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:42:21.818000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20031210-acns-auth.shtml"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/9187"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/352462"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/10409"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/13945"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13945"
      },
      {
        "trust": 0.8,
        "url": "http://www.secunia.com/advisories/10409/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "db": "BID",
        "id": "9187"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "db": "BID",
        "id": "9187"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-12-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "date": "2004-01-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "date": "2003-12-10T00:00:00",
        "db": "BID",
        "id": "9187"
      },
      {
        "date": "2003-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "date": "2004-01-05T05:00:00",
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-12-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#352462"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7807"
      },
      {
        "date": "2003-12-10T00:00:00",
        "db": "BID",
        "id": "9187"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      },
      {
        "date": "2018-10-30T16:25:18.480000",
        "db": "NVD",
        "id": "CVE-2003-0982"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco ACNS contains buffer overflow vulnerability in the authentication module when supplied an overly long password",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#352462"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200401-016"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…