CVE-2009-0059
Published Feb 5, 2009
Last updated 6 years ago
Overview
- Description
- The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB886E18-A1F0-4A05-AFBF-FFC4FA72373C" }, { "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5561784-ACF8-4CCD-94FA-AAA17AC8363E" }, { "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5830E746-BD5C-43A6-914F-1D8411E235E3" }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49DECEDD-4D87-455B-BC28-6227ABC49714" }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D797EE92-8C85-4C83-A96A-DF1922712742" }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA1C016C-30FA-4F76-883B-12712316F750" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8FFC9F3-8342-4A71-9731-14EF90C8E678" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E82E205F-2FA0-4030-8BC9-D622FCF015BF" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54A95FA8-80E7-4995-ABE8-86326E698017" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB9B9EF-1ADF-4C04-A9C4-EF87EF999D7E" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C59B5CEE-8756-4A42-B9BA-489CE0DE5AA3" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_series_wireless_lan_controller:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21F21CDB-2DFE-4781-8FC6-DF449FB6FA64" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F3A8DBB-9E82-4428-9034-391F662DFA0B" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6" } ], "operator": "OR" } ] } ]