Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*", "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*", "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*", "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*", "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*", "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*", "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*", "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*", "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*", "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*", "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*", "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*", "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*", "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*", "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*", "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*", "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*", "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*", "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*", "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*", "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*", "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*", "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*", "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*", "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*", "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*", "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*", "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*", "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*", "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*", "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*", "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*", "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*", "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*", "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*", "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*", "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*", "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*", "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*", "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*", "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*", "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*", "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*", "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak."}, {"lang": "es", "value": "Fuga de memoria en la funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda del dispositivo) mediante la conexi\u00f3n de una sesi\u00f3n SSL de forma anormal, precedida de una p\u00e9rdida de bloque de control de transmisi\u00f3n (TCB)."}], "id": "CVE-2009-0628", "lastModified": "2024-11-21T01:00:33.397", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-03-27T16:30:01.967", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/34438"}, {"source": "ykramarz@cisco.com", "url": "http://securitytracker.com/id?1021896"}, {"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"}, {"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"}, {"source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/34239"}, {"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/0851"}, {"source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"}, {"source": "ykramarz@cisco.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/34438"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021896"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34239"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/0851"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}