fkie_cve-2003-0259
Vulnerability from fkie_nvd
Published
2003-05-27 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7 allows remote attackers to cause a denial of service (reload) via a malformed SSH initialization packet.
Impacted products
Vendor Product Version
cisco vpn_3015_concentrator *
cisco vpn_3030_concentator *
cisco vpn_3060_concentrator *
cisco vpn_3080_concentrator *
cisco vpn_3000_concentrator_series_software 2.0
cisco vpn_3000_concentrator_series_software 2.5.2.a
cisco vpn_3000_concentrator_series_software 2.5.2.b
cisco vpn_3000_concentrator_series_software 2.5.2.c
cisco vpn_3000_concentrator_series_software 2.5.2.d
cisco vpn_3000_concentrator_series_software 2.5.2.f
cisco vpn_3000_concentrator_series_software 3.0
cisco vpn_3000_concentrator_series_software 3.0.3.a
cisco vpn_3000_concentrator_series_software 3.0.3.b
cisco vpn_3000_concentrator_series_software 3.0.4
cisco vpn_3000_concentrator_series_software 3.1
cisco vpn_3000_concentrator_series_software 3.1\(rel\)
cisco vpn_3000_concentrator_series_software 3.1.1
cisco vpn_3000_concentrator_series_software 3.1.2
cisco vpn_3000_concentrator_series_software 3.1.4
cisco vpn_3000_concentrator_series_software 3.5\(rel\)
cisco vpn_3000_concentrator_series_software 3.5.1
cisco vpn_3000_concentrator_series_software 3.5.2
cisco vpn_3000_concentrator_series_software 3.5.3
cisco vpn_3000_concentrator_series_software 3.5.4
cisco vpn_3000_concentrator_series_software 3.5.5
cisco vpn_3000_concentrator_series_software 3.6
cisco vpn_3000_concentrator_series_software 3.6.1
cisco vpn_3000_concentrator_series_software 3.6.3
cisco vpn_3000_concentrator_series_software 3.6.5
cisco vpn_3000_concentrator_series_software 3.6.7
cisco vpn_3000_concentrator_series_software 3.6.7.a
cisco vpn_3000_concentrator_series_software 3.6.7.b
cisco vpn_3000_concentrator_series_software 3.6.7.c
cisco vpn_3000_concentrator_series_software 3.6.7.d
cisco vpn_3000_concentrator_series_software 3.6.7d
cisco vpn_3002_hardware_client *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:vpn_3015_concentrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A512328-2FD0-4B1D-9327-A13A0BCE9C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:vpn_3030_concentator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6548F964-B8EE-4B39-87CF-99743D41C42C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:vpn_3060_concentrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08810E6-33B6-45FF-91C7-EED10DC023EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:vpn_3080_concentrator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD1A1AC-980F-428E-8BAF-0FC821014868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "923949D1-06EC-462F-A3BC-FCAB448042A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*",
              "matchCriteriaId": "901B1838-7169-41E5-80EF-29BB680BF937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAEAA5F-0A98-48B7-8012-9B9909243135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*",
              "matchCriteriaId": "11DA4B03-2D30-4514-9DF5-5F0DDD4B8DC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB38834B-E4AB-43F4-888B-14B088C95594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F8059B-3968-4D63-B1B3-74E545C918D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "701CDA0D-F932-4251-B484-8F20F0AE9003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E674AA43-905E-40E0-A70F-77D05C62C18D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F0D767F-7142-46D2-B3E4-7FE8E9E3285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "057A6BA0-5F5E-4FC4-B2EC-A17968EAC2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "645AB682-2965-4C8D-B323-AB510E424407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\(rel\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76F7F019-A0A4-49CD-BB28-24BF7725AC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "175CD875-3402-4B06-A3FA-7DFFCBB44056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF61B8A5-31E7-40F5-8B3D-CA90E50618AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9017BB-5848-4361-ABB9-C69FB3AB90FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\(rel\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "207034E8-35F7-4E78-A3FC-C86D20EB8D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C544E523-15E5-4CE5-8113-53454F5D9973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09F6EBD-C3FC-4680-BE31-A766D863237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8C3FDA-D321-4202-A8EA-6C1464558A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68705AB-A133-401F-9F41-64594E071816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9092680-E154-4EAB-A2D5-B692073F894E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF5F3FA-5FA4-408E-BA62-3943C5DFD859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADFC9764-5BF5-449F-9200-5569C13F8309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12F2AAC-DB5B-4C28-86C5-F59490362E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "071F52AD-D59B-4673-BCBE-112B94D3EB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "80709CB0-D386-4C4F-B3EE-7A0501FD7248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFAF42-B894-4D62-A9CF-3349A43191AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.b:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABE5BB7F-D8B4-441B-9F45-56F622EEAA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B87A7EC-DC23-4075-8C4A-2317FF34BDB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.d:*:*:*:*:*:*:*",
              "matchCriteriaId": "98AC18E3-D12B-489D-9D95-6C9210235FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*",
              "matchCriteriaId": "36291ADE-3D5A-4E49-8BA7-B71CAAA226B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:vpn_3002_hardware_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12ECF578-84BF-4F41-9462-C09FA517F2A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7 allows remote attackers to cause a denial of service (reload) via a malformed SSH initialization packet."
    },
    {
      "lang": "es",
      "value": "Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7 permiten que atacantes remotos causen una denegaci\u00f3n de servicio (recarga) mediante un paquete de inicializaci\u00f3n SSH mal constru\u00eddo."
    }
  ],
  "id": "CVE-2003-0259",
  "lastModified": "2024-11-20T23:44:20.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-05-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/317348"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/317348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11955"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.