ID

VAR-200809-0036


CVE

CVE-2008-3802


TITLE

Cisco IOS of SIP In implementation SIP Service disruption related to message processing (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001771

DESCRIPTION

Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4, when VoIP is configured, allows remote attackers to cause a denial of service (device reload) via unspecified valid SIP messages, aka Cisco bug ID CSCsk42759, a different vulnerability than CVE-2008-3800 and CVE-2008-3801. The problem is Bug ID : CSCsk42759 It is a problem. this is CVE-2008-3800 and CVE-2008-3801 Is a different vulnerability.Service operation disrupted by a third party (DoS) There is a possibility of being put into a state. Devices running Cisco IOS with SIP enabled are prone to multiple denial-of-service vulnerabilities. These issues are tracked by the following Cisco bug IDs and CVEs: CSCse56800 (CVE-2008-3799) CSCsg91306 (CVE-2008-3800) CSCsl62609 (CVE-2008-3801) CSCsk42759 (CVE-2008-3802) An attacker can exploit these issues to deny service to legitimate users. Cisco IOS is the Internet operating system used on Cisco networking equipment. A remote attacker causes a denial of service by unidentifying a valid SIP message. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Cisco IOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31990 VERIFY ADVISORY: http://secunia.com/advisories/31990/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/advisories/product/50/ Cisco IOS 12.x http://secunia.com/advisories/product/182/ DESCRIPTION: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. 1) An unspecified error exists in the processing of SSL packets during the termination of an SSL session, which can potentially be exploited to crash an affected system. 2) Two unspecified errors exist within the processing of Protocol Independent Multicast (PIM) packets, which can be exploited to cause an affected device to reload. Successful exploitation requires that the device is configured with Network Address Translation (NAT) SCCP Fragmentation Support. 5) Multiple unspecified errors exist in the processing of SIP messages, which can be exploited to cause a reload of an affected device. 6) An unspecified error in the IOS Intrusion Prevention System (IPS) feature when processing certain IPS signatures that use the SERVICE.DNS engine can be exploited to cause a DoS via specially crafted network traffic. 7) A security issue exists in the processing of extended communities with Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPN), which can lead to traffic leaking from one MPLS VPN to another. This security issue does not affect Cisco IOS releases based on 12.1. NOTE: This security issue was introduced with CSCee83237. Cisco IOS images that do not include CSCee83237 are reportedly not affected. 8) An unspecified error within the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) can be exploited to cause a DoS via specially crafted network packets. Successful exploitation requires access to the MPLS network. 9) An unspecified error within the Application Inspection Control (AIC) can be exploited to cause a reload of an affected device via specially crafted HTTP packets. 10) An unspecified error in the processing of Layer 2 Tunneling Protocol (L2TP) packets can be exploited to cause an affected device to reload via a specially crafted L2TP packets. Successful exploitation requires that the L2TP mgmt daemon process is running. This process may be enabled e.g. via Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP), or Cisco Virtual Private Dial-Up Networks (VPDN). 11) An unspecified error exists in the processing of IPC messages. This can be exploited to reload an affected device via a specially crafted UDP packet sent to port 1975. This vulnerability is reported in Cisco 10000, uBR10012, and uBR7200 series devices. 12) A security issue is caused due to the device automatically enabling SNMP with a default community string, which can be exploited to gain control an affected system. Successful exploitation requires that a device is configured for linecard redundancy. SOLUTION: Update to the fixed version (please see the vendor's advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3802 // JVNDB: JVNDB-2008-001771 // BID: 31361 // VULHUB: VHN-33927 // PACKETSTORM: 70347

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.4xl

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xt

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xy

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xw

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xj

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xe

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xp

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xd

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.3xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3za

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ze

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3tpc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3va

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2tpc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2by

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xv

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3vascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t11scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xd11scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xb10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mrscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.4(18)

Trust: 0.3

vendor:ciscomodel:ios 12.4 xy3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xl2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xw7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yx12scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ym13scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yz3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sb2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mc2cscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 yv1scope:neversion: -

Trust: 0.3

sources: BID: 31361 // JVNDB: JVNDB-2008-001771 // CNNVD: CNNVD-200809-369 // NVD: CVE-2008-3802

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3802
value: HIGH

Trust: 1.0

NVD: CVE-2008-3802
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-369
value: HIGH

Trust: 0.6

VULHUB: VHN-33927
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3802
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33927
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33927 // JVNDB: JVNDB-2008-001771 // CNNVD: CNNVD-200809-369 // NVD: CVE-2008-3802

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2008-3802

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-369

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200809-369

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001771

PATCH

title:cisco-amb-20080924-sipurl:http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a01558.html

Trust: 0.8

title:cisco-sa-20080924-sipurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml

Trust: 0.8

title:Cisco IOS SIP Fixes for Unknown Denial of Service Vulnerabilities in Packet Processingurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194940

Trust: 0.6

sources: JVNDB: JVNDB-2008-001771 // CNNVD: CNNVD-200809-369

EXTERNAL IDS

db:NVDid:CVE-2008-3802

Trust: 2.8

db:SECUNIAid:31990

Trust: 2.6

db:SECTRACKid:1020939

Trust: 1.7

db:VUPENid:ADV-2008-2670

Trust: 1.7

db:BIDid:31361

Trust: 1.1

db:JVNDBid:JVNDB-2008-001771

Trust: 0.8

db:CNNVDid:CNNVD-200809-369

Trust: 0.6

db:VULHUBid:VHN-33927

Trust: 0.1

db:PACKETSTORMid:70347

Trust: 0.1

sources: VULHUB: VHN-33927 // BID: 31361 // JVNDB: JVNDB-2008-001771 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-369 // NVD: CVE-2008-3802

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a01562.shtml

Trust: 2.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5889

Trust: 1.7

url:http://www.securitytracker.com/id?1020939

Trust: 1.7

url:http://secunia.com/advisories/31990

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2670

Trust: 1.7

url:http://secunia.com/advisories/31990/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3802

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2670

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3802

Trust: 0.8

url:http://www.securityfocus.com/bid/31361

Trust: 0.8

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:/archive/1/496706

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml

Trust: 0.1

url:http://secunia.com/advisories/product/182/

Trust: 0.1

url:http://secunia.com/advisories/product/50/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33927 // BID: 31361 // JVNDB: JVNDB-2008-001771 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-369 // NVD: CVE-2008-3802

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200809-369

SOURCES

db:VULHUBid:VHN-33927
db:BIDid:31361
db:JVNDBid:JVNDB-2008-001771
db:PACKETSTORMid:70347
db:CNNVDid:CNNVD-200809-369
db:NVDid:CVE-2008-3802

LAST UPDATE DATE

2025-04-10T22:56:57.806000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33927date:2018-10-30T00:00:00
db:BIDid:31361date:2008-09-24T22:29:00
db:JVNDBid:JVNDB-2008-001771date:2008-10-24T00:00:00
db:CNNVDid:CNNVD-200809-369date:2022-06-08T00:00:00
db:NVDid:CVE-2008-3802date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33927date:2008-09-26T00:00:00
db:BIDid:31361date:2008-09-24T00:00:00
db:JVNDBid:JVNDB-2008-001771date:2008-10-24T00:00:00
db:PACKETSTORMid:70347date:2008-09-25T23:06:17
db:CNNVDid:CNNVD-200809-369date:2008-09-26T00:00:00
db:NVDid:CVE-2008-3802date:2008-09-26T16:21:44.127