CVE-2007-5568
Published Oct 18, 2007
Last updated a year ago
Overview
- Description
- Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM).
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DCA42A4-3E45-4060-A327-91A9093E27AA", "versionEndIncluding": "3.1\\(5\\)" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0" } ], "operator": "OR" } ] } ]