CVE-2010-2818
Published Aug 9, 2010
Last updated 14 years ago
Overview
- Description
- Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D" }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D" }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4" } ], "operator": "OR" } ], "operator": "AND" } ]