CVE-2009-2051
https://notcve.org/view.php?id=CVE-2009-2051
Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), and 7.x before 7.1(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via a malformed SIP INVITE message that triggers an improper call to the sipSafeStrlen function, aka Bug IDs CSCsz40392 and CSCsz43987. Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) v4.x, v5.x anteriores a v5.1(3g), v6.x anteriores v6.1(4), y v7.x anteriores v7.1(2) permite a los atacantes remotos causar una denegación de servicio (parada del servicio de voz) a través de mensajes malformados SIP INVITE que lanzan una llamada incorrecta a la función sipSafeStrlen, también conocida como Bug ID CSCsz40392. • http://osvdb.org/57453 http://secunia.com/advisories/36498 http://secunia.com/advisories/36499 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml http://www.securityfocus.com/bid/36152 http://www.securitytracker.com/id?1022775 •
CVE-2009-1168
https://notcve.org/view.php?id=CVE-2009-1168
Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1, v12.2XNC anterior a v12.2(33)XNC2, v12.2XND anterior a v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria o reinicio del dispositivo) usando un par RFC4271 para enviar una actualización con una serie larga de números AS, también conocido como fallo ID CSCsy86021. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35862 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697 • CWE-399: Resource Management Errors •
CVE-2009-2049
https://notcve.org/view.php?id=CVE-2009-2049
Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1 through 12.2(33)SXI2, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (device reload) by using an RFC4271 peer to send a malformed update, aka Bug ID CSCta33973. Cisco IOS v12.0(32)S12 hasta v12.0(32)S13 y v12.0(33)S3 hasta v12.0(33)S4, v12.0(32)SY8 hasta v12.0(32)SY9, v12.2(33)SXI1 hasta v12.2(33)SXI2, v12.2XNC hasta v12.2(33)XNC2, v12.2XND hasta v12.2(33)XND1, y v12.4(24)T1; y IOS XE v2.3 hasta v2.3.1t y v2.4 hasta v2.4.0; cuando el enrutado RFC4893 BGP está habilitado, lo que permite a los atacantes remoto causar una denegación de servicio (recarga del dispositivo) usando un par RFC4271 para enviar una actualización malformado, también conocido como Bud ID CSCta33973. • http://secunia.com/advisories/36046 http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml http://www.securityfocus.com/bid/35860 http://www.securitytracker.com/id?1022619 http://www.vupen.com/english/advisories/2009/2082 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853 • CWE-16: Configuration •
CVE-2009-1220 – Cisco ASA Appliance 7.x/8.0 WebVPN - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-1220
Cross-site scripting (XSS) vulnerability in +webvpn+/index.html in WebVPN on the Cisco Adaptive Security Appliances (ASA) 5520 with software 7.2(4)30 and earlier 7.2 versions including 7.2(2)22, and 8.0(4)28 and earlier 8.0 versions, when clientless mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the Host HTTP header. Una vulnerabilidad de tipo cross-site scripting (XSS) en archivo +webvpn+/index.html en el WebVPN en los Adaptive Security Appliances (ASA) 5520 de Cisco con el software versiones 7.2(4)30 y anteriores a 7.2 incluyendo 7.2(2)22, y versiones 8.0(4)28 y anteriores a 8.0, cuando el modo clientless está habilitado, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio del encabezado HTTP Host. • https://www.exploit-db.com/exploits/32878 http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0478.html http://tools.cisco.com/security/center/viewAlert.x?alertId=17950 http://www.securityfocus.com/archive/1/502313/100/0/threaded http://www.securityfocus.com/archive/1/502932 http://www.securityfocus.com/bid/34307 http://www.securitytracker.com/id?1022122 http://www.vupen.com/english/advisories/2009/1169 https://exchange.xforce.ibmcloud.com/vulnerabilities/49528 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2009-0630
https://notcve.org/view.php?id=CVE-2009-0630
The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets. Las funcionalidades (1) Cisco Unified Communications Manager Express; (2) el soporte de Transport Layer Security (TLS) para SIP Gateway Signaling; (3) Secure Signaling y Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect para EAPoUDP, Dot1x, y la integración de autenticación MAC; (7) Distributed Director con HTTP Redirects; y (8) TCP DNS en Cisco IOS v12.0 hasta 12.4 no maneja adecuadamente los "sockets", permitiendo a atacantes remotos provocar una denegación de servicio (apagado o consumo de recursos) mediante una serie de paquetes TCP manipulados. • http://secunia.com/advisories/34438 http://securitytracker.com/id?1021897 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml http://www.securityfocus.com/bid/34242 http://www.vupen.com/english/advisories/2009/0851 https://exchange.xforce.ibmcloud.com/vulnerabilities/49418 •