var-200702-0340
Vulnerability from variot

Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors. Cisco PIX 500 Series and Cisco ASA 5500 series The security appliance has user authentication. LOCAL A vulnerability exists that could allow elevation of privilege by remotely authenticated users when using the method. According to information from Cisco Systems, users who exploit this vulnerability are privileged. 0 Defined in the local database, only in this case the user is privileged 15 Has been reported to be able to be elevated to administrator privileges.On devices under certain conditions, it may be possible to gain administrative privileges from a remotely authenticated user. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Both the Cisco PIX and the ASA are very popular firewall devices that provide firewall services capable of stateful packet filtering and deep packet inspection. Remote attackers may use this loophole to elevate their privileges on the device. Only users who meet these conditions can escalate their assigned privileges to level 15. Once an administrator, users can change every aspect of device configuration and operation. A device is affected by this vulnerability if the following line exists in the device configuration: pixfirewall(config)# aaa authentication enable console LOCAL pixfirewall(config)# username password privilege 0 This vulnerability is documented in Cisco Bug ID as CSCsh33287.

Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/

TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service

SECUNIA ADVISORY ID: SA24160

VERIFY ADVISORY: http://secunia.com/advisories/24160/

CRITICAL: Moderately critical

IMPACT: Privilege escalation, DoS

WHERE:

From remote

OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/

DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service).

1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled.

2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default).

3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0.

SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

.

2) An unspecified vulnerability when manipulating ACLs (Access Control Lists) that makes use of object groups can be exploited to corrupt ACLs, resulting in ACE (Access Control Entries) being skipped or not evaluated in order.

Successful exploitation requires that "SIP fixup" is enabled, which is the default setting

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0340",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pix firewall software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.2\\(2\\)"
      },
      {
        "model": "asa 5500",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.2\\(2\\)"
      },
      {
        "model": "pix/asa",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "7.2"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "7.2\\(2\\)"
      },
      {
        "model": "pix/asa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.2.2"
      },
      {
        "model": "pix/asa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.2(2.10)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:pix_asa",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Security bulletin",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0960",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2007-0960",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-24322",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-0960",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-0960",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-322",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24322",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors. Cisco PIX 500 Series and Cisco ASA 5500 series The security appliance has user authentication. LOCAL A vulnerability exists that could allow elevation of privilege by remotely authenticated users when using the method. According to information from Cisco Systems, users who exploit this vulnerability are privileged. 0 Defined in the local database, only in this case the user is privileged 15 Has been reported to be able to be elevated to administrator privileges.On devices under certain conditions, it may be possible to gain administrative privileges from a remotely authenticated user. \nExploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Both the Cisco PIX and the ASA are very popular firewall devices that provide firewall services capable of stateful packet filtering and deep packet inspection. Remote attackers may use this loophole to elevate their privileges on the device. Only users who meet these conditions can escalate their assigned privileges to level 15. Once an administrator, users can change every aspect of device configuration and operation. A device is affected by this vulnerability if the following line exists in the device configuration: pixfirewall(config)# aaa authentication enable console LOCAL pixfirewall(config)# username \u003cuser_name\u003e password \u003csecret_pwd\u003e privilege 0 This vulnerability is documented in Cisco Bug ID as CSCsh33287. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco PIX and ASA Privilege Escalation and Denial of Service\n\nSECUNIA ADVISORY ID:\nSA24160\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24160/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nPrivilege escalation, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco PIX 7.x\nhttp://secunia.com/product/6102/\nCisco Adaptive Security Appliance (ASA) 7.x\nhttp://secunia.com/product/6115/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Cisco PIX and ASA, which\ncan be exploited by malicious users to gain escalated privileges and\nby malicious people to cause a DoS (Denial of Service). \n\n1) An unspecified error exists within the enhanced HTTP inspection\nfeature. This can be exploited to crash the device via malformed HTTP\nrequests, but requires that enhanced HTTP inspection is enabled. \n\n2) An unspecified error exists within the SIP packet inspection. This\ncan be exploited to crash the device by sending specially crafted SIP\npackets, but requires that \"inspect\" is enabled (it is disabled by\ndefault). \n\n3) An unspecified error exists within the TCP-based protocol\ninspection. This can be exploited to crash the device via malformed\npackets, but requires that inspection of TCP-based protocols (e.g. \nFTP or HTTP) is enabled. Successful exploitation\nallows gaining privilege level 15 and changing the complete\nconfiguration of the device, but requires that the attacker can\nauthenticate to the device and that he is defined in the local\ndatabase with privilege level 0. \n\nSOLUTION:\nApply updated versions. See the vendor advisory for a patch matrix. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n2) An unspecified vulnerability when manipulating ACLs (Access\nControl Lists) that makes use of object groups can be exploited to\ncorrupt ACLs, resulting in ACE (Access Control Entries) being skipped\nor not evaluated in order. \n\nSuccessful exploitation requires that \"SIP fixup\" is enabled, which\nis the default setting",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54453"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "22562",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "24160",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "24179",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1017652",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1017651",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "33063",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "22561",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0608",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "32489",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-24322",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54452",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54453",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54453"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "id": "VAR-200702-0340",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:49:12.953000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20070214-pix",
        "trust": 0.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/22562"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/22561"
      },
      {
        "trust": 1.7,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/33063"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1017651"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1017652"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24160"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24179"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/0608"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/0608"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/24160/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0960"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0960"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/32489"
      },
      {
        "trust": 0.5,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/460079"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6102/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6115/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/56/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24179/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54453"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "db": "BID",
        "id": "22562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "db": "PACKETSTORM",
        "id": "54453"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "date": "2007-02-14T00:00:00",
        "db": "BID",
        "id": "22562"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "date": "2007-02-16T06:49:41",
        "db": "PACKETSTORM",
        "id": "54452"
      },
      {
        "date": "2007-02-16T06:49:41",
        "db": "PACKETSTORM",
        "id": "54453"
      },
      {
        "date": "2007-02-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "date": "2007-02-16T00:28:00",
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24322"
      },
      {
        "date": "2016-07-06T14:39:00",
        "db": "BID",
        "id": "22562"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      },
      {
        "date": "2007-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      },
      {
        "date": "2024-11-21T00:27:09.910000",
        "db": "NVD",
        "id": "CVE-2007-0960"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco PIX/ASA User authentication in  LOCAL Elevation of privilege vulnerability when using methods",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000143"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-322"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.