Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/27193 - | |
References | () http://secunia.com/advisories/27236 - | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml - | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml - | |
References | () http://www.securityfocus.com/bid/26104 - | |
References | () http://www.securityfocus.com/bid/26109 - | |
References | () http://www.securitytracker.com/id?1018825 - | |
References | () http://www.securitytracker.com/id?1018826 - | |
References | () http://www.securitytracker.com/id?1018827 - | |
References | () http://www.vupen.com/english/advisories/2007/3530 - | |
References | () http://www.vupen.com/english/advisories/2007/3531 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37257 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37259 - |
11 Aug 2023, 19:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.10\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.8\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(1.22\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\(6.7\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.17\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.16\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\(5\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\(2.48\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\(2.27\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.19\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\(5.2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\(4\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.7\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\(2.49\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\(2.15\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\(2.5\):*:*:*:*:*:*:* |
cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.27\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.14\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(5.2\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.49\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.5\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.8\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.7\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.16\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(1.22\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(1\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(5\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.15\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.48\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.19\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(4\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.17\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.10\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(6.7\):*:*:*:*:*:*:* |
Information
Published : 2007-10-18 21:17
Updated : 2024-11-21 00:38
NVD link : CVE-2007-5568
Mitre link : CVE-2007-5568
CVE.ORG link : CVE-2007-5568
JSON object : View
Products Affected
cisco
- firewall_services_module
- adaptive_security_appliance_software
CWE
CWE-20
Improper Input Validation