ID

VAR-200401-0044


CVE

CVE-2003-1003


TITLE

Cisco PIX Firewall In SNMPv3 Service disruption by (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2003-000377

DESCRIPTION

Cisco PIX firewall 5.x.x, and 6.3.1 and earlier, allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. Cisco PIX Firewall Is SNMP Activate a specific SNMP Management station IP By address setting, SNMPv3 A vulnerability exists that crashes when trying to interpret a packet when it is received.Cisco PIX Firewall Service disruption (DoS) It may be in a state. The first issue has been reported to present itself when the affected PIX firewall processes an SNMPv3 message, in certain circumstances. The second issue that was reported by the vendor is that a remote attacker may close established VPN sessions between a Cisco PIX appliance that is configured as a VPN Client and a remote VPN server. This vulnerability is not affected only when the snmp-server host <if_name> <ip_addr> trap command is configured on the Cisco PIX firewall

Trust: 2.25

sources: NVD: CVE-2003-1003 // JVNDB: JVNDB-2003-000377 // BID: 9221 // BID: 88171 // VULHUB: VHN-7828

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewallscope:eqversion:5.2

Trust: 2.0

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2_.111

Trust: 1.6

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 1.4

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 1.4

vendor:ciscomodel:pix firewallscope:eqversion:5.1

Trust: 1.2

vendor:ciscomodel:pix firewallscope:eqversion:5.0

Trust: 1.2

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 1.1

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(3.210\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(9\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3.100\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(6\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(7\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3.102\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(1.200\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4.101\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1\(4.206\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.3(1)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.2(2)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.1(4)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.3(2)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1.200)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.3

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2(2)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2(1)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(3.210\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(1\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(2\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(5\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.1\(4\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.1\(4.206\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2.111

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3.100)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4.101)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1(4.206)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:2.1(0.208)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.5

Trust: 0.3

sources: BID: 9221 // BID: 88171 // JVNDB: JVNDB-2003-000377 // CNNVD: CNNVD-200401-022 // NVD: CVE-2003-1003

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-1003
value: HIGH

Trust: 1.0

NVD: CVE-2003-1003
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200401-022
value: HIGH

Trust: 0.6

VULHUB: VHN-7828
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2003-1003
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2003-1003
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-7828
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-7828 // JVNDB: JVNDB-2003-000377 // CNNVD: CNNVD-200401-022 // NVD: CVE-2003-1003

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-7828 // JVNDB: JVNDB-2003-000377 // NVD: CVE-2003-1003

THREAT TYPE

network

Trust: 0.6

sources: BID: 9221 // BID: 88171

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200401-022

CONFIGURATIONS

sources: JVNDB: JVNDB-2003-000377

PATCH

title:cisco-sa-20031215-pixurl:http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2003-000377

EXTERNAL IDS

db:NVDid:CVE-2003-1003

Trust: 2.8

db:BIDid:9221

Trust: 1.1

db:SECTRACKid:1008474

Trust: 0.8

db:JVNDBid:JVNDB-2003-000377

Trust: 0.8

db:CNNVDid:CNNVD-200401-022

Trust: 0.7

db:CISCOid:20031215 CISCO PIX VULNERABILITIES

Trust: 0.6

db:BIDid:88171

Trust: 0.3

db:VULHUBid:VHN-7828

Trust: 0.1

sources: VULHUB: VHN-7828 // BID: 9221 // BID: 88171 // JVNDB: JVNDB-2003-000377 // CNNVD: CNNVD-200401-022 // NVD: CVE-2003-1003

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20031215-pix.shtml

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-1003

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-1003

Trust: 0.8

url:http://www.securityfocus.com/bid/9221

Trust: 0.8

url:http://www.securitytracker.com/alerts/2003/dec/1008474.html

Trust: 0.8

sources: VULHUB: VHN-7828 // BID: 9221 // BID: 88171 // JVNDB: JVNDB-2003-000377 // CNNVD: CNNVD-200401-022 // NVD: CVE-2003-1003

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200401-022

SOURCES

db:VULHUBid:VHN-7828
db:BIDid:9221
db:BIDid:88171
db:JVNDBid:JVNDB-2003-000377
db:CNNVDid:CNNVD-200401-022
db:NVDid:CVE-2003-1003

LAST UPDATE DATE

2024-08-14T14:23:05.978000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-7828date:2018-10-30T00:00:00
db:BIDid:9221date:2003-12-15T00:00:00
db:BIDid:88171date:2016-07-06T14:33:00
db:JVNDBid:JVNDB-2003-000377date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200401-022date:2005-10-20T00:00:00
db:NVDid:CVE-2003-1003date:2018-10-30T16:26:18.123

SOURCES RELEASE DATE

db:VULHUBid:VHN-7828date:2004-01-05T00:00:00
db:BIDid:9221date:2003-12-15T00:00:00
db:BIDid:88171date:2004-01-05T00:00:00
db:JVNDBid:JVNDB-2003-000377date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200401-022date:2003-12-15T00:00:00
db:NVDid:CVE-2003-1003date:2004-01-05T05:00:00