var-200809-0041
Vulnerability from variot

Cisco IOS 12.2 and 12.3 on Cisco uBR10012 series devices, when linecard redundancy is configured, enables a read/write SNMP service with "private" as the community, which allows remote attackers to obtain administrative access by guessing this community and sending SNMP requests. Cisco uBR10012 routers are high-performance network devices. The routers are prone to a weak default configuration issue. A remote attacker may exploit this issue to gain complete access to the vulnerable device. Cisco uBR10012 routers are vulnerable. This issue is being tracked by Cisco bug ID CSCek57932. ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: Cisco IOS Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA31990

VERIFY ADVISORY: http://secunia.com/advisories/31990/

CRITICAL: Moderately critical

IMPACT: Exposure of sensitive information, DoS, System access

WHERE:

From remote

OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/advisories/product/50/ Cisco IOS 12.x http://secunia.com/advisories/product/182/

DESCRIPTION: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system.

1) An unspecified error exists in the processing of SSL packets during the termination of an SSL session, which can potentially be exploited to crash an affected system.

2) Two unspecified errors exist within the processing of Protocol Independent Multicast (PIM) packets, which can be exploited to cause an affected device to reload.

3) Unspecified errors within the processing of segmented Skinny Call Control Protocol (SCCP) messages can be exploited to cause a Cisco IOS device to reload.

Successful exploitation requires that the device is configured with Network Address Translation (NAT) SCCP Fragmentation Support.

4) A memory leak in the processing of Session Initiation Protocol (SIP) messages can be exploited to cause a DoS for all voice services.

5) Multiple unspecified errors exist in the processing of SIP messages, which can be exploited to cause a reload of an affected device.

6) An unspecified error in the IOS Intrusion Prevention System (IPS) feature when processing certain IPS signatures that use the SERVICE.DNS engine can be exploited to cause a DoS via specially crafted network traffic.

7) A security issue exists in the processing of extended communities with Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPN), which can lead to traffic leaking from one MPLS VPN to another.

This security issue does not affect Cisco IOS releases based on 12.1.

NOTE: This security issue was introduced with CSCee83237. Cisco IOS images that do not include CSCee83237 are reportedly not affected.

8) An unspecified error within the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) can be exploited to cause a DoS via specially crafted network packets.

Successful exploitation requires access to the MPLS network.

9) An unspecified error within the Application Inspection Control (AIC) can be exploited to cause a reload of an affected device via specially crafted HTTP packets.

10) An unspecified error in the processing of Layer 2 Tunneling Protocol (L2TP) packets can be exploited to cause an affected device to reload via a specially crafted L2TP packets.

Successful exploitation requires that the L2TP mgmt daemon process is running. This process may be enabled e.g. via Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP), or Cisco Virtual Private Dial-Up Networks (VPDN).

11) An unspecified error exists in the processing of IPC messages. This can be exploited to reload an affected device via a specially crafted UDP packet sent to port 1975.

12) A security issue is caused due to the device automatically enabling SNMP with a default community string, which can be exploited to gain control an affected system.

Successful exploitation requires that a device is configured for linecard redundancy.

This vulnerability affects Cisco uBR10012 series devices running IOS.

SOLUTION: Update to the fixed version (please see the vendor's advisories for details).

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200809-0041",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.2xf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.2bc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.2cy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.2cx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.3bc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "12.3"
      },
      {
        "model": "ubr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "100120"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "31355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:cisco:ios",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Security bulletin",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-3807",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2008-3807",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2008-3807",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-33932",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-3807",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-3807",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200809-374",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-33932",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2008-3807",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco IOS 12.2 and 12.3 on Cisco uBR10012 series devices, when linecard redundancy is configured, enables a read/write SNMP service with \"private\" as the community, which allows remote attackers to obtain administrative access by guessing this community and sending SNMP requests. Cisco uBR10012 routers are high-performance network devices. \nThe routers are prone to a weak default configuration issue. A remote attacker may exploit this issue to gain complete access to the vulnerable device. \nCisco uBR10012 routers are vulnerable. \nThis issue is being tracked by Cisco bug ID CSCek57932. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco IOS Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA31990\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/31990/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nExposure of sensitive information, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco IOS R12.x\nhttp://secunia.com/advisories/product/50/\nCisco IOS 12.x\nhttp://secunia.com/advisories/product/182/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Cisco IOS, which can be\nexploited by malicious people to disclose sensitive information,\ncause a DoS (Denial of Service), or to compromise a vulnerable\nsystem. \n\n1) An unspecified error exists in the processing of SSL packets\nduring the termination of an SSL session, which can potentially be\nexploited to crash an affected system. \n\n2) Two unspecified errors exist within the processing of Protocol\nIndependent Multicast (PIM) packets, which can be exploited to cause\nan affected device to reload. \n\n3) Unspecified errors within the processing of segmented Skinny Call\nControl Protocol (SCCP) messages can be exploited to cause a Cisco\nIOS device to reload. \n\nSuccessful exploitation requires that the device is configured with\nNetwork Address Translation (NAT) SCCP Fragmentation Support. \n\n4) A memory leak in the processing of Session Initiation Protocol\n(SIP) messages can be exploited to cause a DoS for all voice\nservices. \n\n5) Multiple unspecified errors exist in the processing of SIP\nmessages, which can be exploited to cause a reload of an affected\ndevice. \n\n6) An unspecified error in the IOS Intrusion Prevention System (IPS)\nfeature when processing certain IPS signatures that use the\nSERVICE.DNS engine can be exploited to cause a DoS via specially\ncrafted network traffic. \n\n7) A security issue exists in the processing of extended communities\nwith Multi Protocol Label Switching (MPLS) Virtual Private Networks\n(VPN), which can lead to traffic leaking from one MPLS VPN to\nanother. \n\nThis security issue does not affect Cisco IOS releases based on\n12.1. \n\nNOTE: This security issue was introduced with CSCee83237. Cisco IOS\nimages that do not include CSCee83237 are reportedly not affected. \n\n8) An unspecified error within the Multi Protocol Label Switching\n(MPLS) Forwarding Infrastructure (MFI) can be exploited to cause a\nDoS via specially crafted network packets. \n\nSuccessful exploitation requires access to the MPLS network. \n\n9) An unspecified error within the Application Inspection Control\n(AIC) can be exploited to cause a reload of an affected device via\nspecially crafted HTTP packets. \n\n10) An unspecified error in the processing of Layer 2 Tunneling\nProtocol (L2TP) packets can be exploited to cause an affected device\nto reload via a specially crafted L2TP packets. \n\nSuccessful exploitation requires that the L2TP mgmt daemon process is\nrunning. This process may be enabled e.g. via Layer 2 virtual private\nnetworks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack\nGroup Bidding Protocol (SGBP), or Cisco Virtual Private Dial-Up\nNetworks (VPDN). \n\n11) An unspecified error exists in the processing of IPC messages. \nThis can be exploited to reload an affected device via a specially\ncrafted UDP packet sent to port 1975. \n\n12) A security issue is caused due to the device automatically\nenabling SNMP with a default community string, which can be exploited\nto gain control an affected system. \n\nSuccessful exploitation requires that a device is configured for\nlinecard redundancy. \n\nThis vulnerability affects Cisco uBR10012 series devices running IOS. \n\nSOLUTION:\nUpdate to the fixed version (please see the vendor\u0027s advisories for\ndetails). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "BID",
        "id": "31355"
      },
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "db": "PACKETSTORM",
        "id": "70347"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-3807",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "31990",
        "trust": 2.7
      },
      {
        "db": "SECTRACK",
        "id": "1020941",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-2670",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "31355",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-33932",
        "trust": 0.1
      },
      {
        "db": "VUPEN",
        "id": "2008/2670",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "70347",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "db": "BID",
        "id": "31355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "PACKETSTORM",
        "id": "70347"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "id": "VAR-200809-0041",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:48:23.650000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-amb-20080924-ipc-and-ubr",
        "trust": 0.8,
        "url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a01522.html"
      },
      {
        "title": "cisco-sa-20080924-ubr",
        "trust": 0.8,
        "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014b1.shtml"
      },
      {
        "title": "Cisco uBR10012 router default SNMP Fixes for Community String Vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194936"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-16",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a0080a014b1.shtml"
      },
      {
        "trust": 1.8,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5452"
      },
      {
        "trust": 1.8,
        "url": "http://www.securitytracker.com/id?1020941"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/31990"
      },
      {
        "trust": 1.8,
        "url": "http://www.vupen.com/english/advisories/2008/2670"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/31990/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3807"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2008/2670"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3807"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/31355"
      },
      {
        "trust": 0.4,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/496709"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/16.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=16634"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/182/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/50/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/binary_analysis/sample_analysis/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "db": "BID",
        "id": "31355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "PACKETSTORM",
        "id": "70347"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "db": "BID",
        "id": "31355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "db": "PACKETSTORM",
        "id": "70347"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-09-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "date": "2008-09-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "date": "2008-09-24T00:00:00",
        "db": "BID",
        "id": "31355"
      },
      {
        "date": "2008-10-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "date": "2008-09-25T23:06:17",
        "db": "PACKETSTORM",
        "id": "70347"
      },
      {
        "date": "2008-09-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "date": "2008-09-26T16:21:44.237000",
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-33932"
      },
      {
        "date": "2017-09-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-3807"
      },
      {
        "date": "2008-09-24T19:49:00",
        "db": "BID",
        "id": "31355"
      },
      {
        "date": "2008-10-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      },
      {
        "date": "2022-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      },
      {
        "date": "2024-11-21T00:50:10.567000",
        "db": "NVD",
        "id": "CVE-2008-3807"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco uBR10012 Runs on series devices  Cisco IOS of  SNMP Service community name vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001766"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "configuration error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-374"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.