ID

VAR-200407-0001


CVE

CVE-2004-0714


TITLE

Cisco IOS fails to properly process solicited SNMP operations

Trust: 0.8

sources: CERT/CC: VU#162451

DESCRIPTION

Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption). Sustained exploitation of this vulnerability could lead to a denial of service condition affect a large segment of the Internet community. / Router disrupts service operation (DoS) It may be in a state. This is caused by a design error that causes memory corruption in the affected system under certain circumstances. The denial of service is due to a corruption of memory in the affected device. As a result, there may be other consequences, such as code execution. This has not been confirmed by Cisco. Cisco IOS is a very widely deployed network operating system. Many Cisco devices run IOS. Specially constructed malformed SNMPv1 and SNMPv2 can trigger this vulnerability, and more dangerously any SNMPv3 "talk" operation detected on such ports can cause memory corruption that overloads the device, resulting in a denial of service. This vulnerability is distinct from the vulnerability described in US-CERT Technical Alert TA04-111A issued earlier today. Cisco has published an advisory about this distinct SNMP issue at the following location: <http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml> I. Description The Simple Network Management Protocol (SNMP) is a widely deployed protocol that is commonly used to monitor and manage network devices. There are several types of SNMP messages that are used to request information or configuration changes, respond to requests, enumerate SNMP objects, and send both solicited and unsolicited alerts. These messages use UDP to communicate network information between SNMP agents and managers. This may potentially cause the device to reload. Typically, ports 161/udp and 162/udp are used during SNMP operations to communicate. While SNMPv1 and SNMPv2c formatted messages can trigger this vulnerability, the greatest risk is exposed when any SNMPv3 solicited operation is sent to a vulnerable port. Cisco notes in their advisory: "SNMPv1 and SNMPv2c solicited operations to the vulnerable ports will perform an authentication check against the SNMP community string, which may be used to mitigate attacks. Through best practices of hard to guess community strings and community string ACLs, this vulnerability may be mitigated for both SNMPv1 and SNMPv2c. However, any SNMPv3 solicited operation to the vulnerable ports will reset the device. If configured for SNMP, all affected versions will process SNMP version 1, 2c and 3 operations." Cisco is tracking this issue as CSCed68575. US-CERT is tracking this issue as VU#162451. II. Impact A remote, unauthenticated attacker could cause the vulnerable device to reload. III. System managers are encouraged to upgrade to one of the non-vulnerable releases. For additional information regarding availability of repaired releases, please refer to the "Software Versions and Fixes" section of the Cisco Security Advisory. <http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml> Workarounds Cisco recommends a number of workarounds, including disabling SNMP processing on affected devices. For a complete list of workarounds, see the Cisco Security Advisory. Appendix A. Vendor Information This appendix contains information provided by vendors for this advisory. As vendors report new information to US-CERT, we will update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments. Cisco has published their advisory at the following location: <http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml> _________________________________________________________________ US-CERT thanks Cisco Systems for notifying us about this problem. _________________________________________________________________ Feedback can be directed to the authors: Jeff Havrilla, Shawn Hernan, Damon Morda The latest version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA04-111B.html> _________________________________________________________________ Copyright 2004 Carnegie Mellon University. Terms of use: <http://www.us-cert.gov/legal.html> Revision History April 20, 2004: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFAhdSYXlvNRxAkFWARAqPXAJ98/hPua542rVKLAgmOVFRJEbLgHACgsBYS vP+68misX1RV+A2fWyU2NQA= =jID6 -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2004-0714 // CERT/CC: VU#162451 // JVNDB: JVNDB-2004-000154 // BID: 10186 // VULHUB: VHN-9144 // PACKETSTORM: 33144

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 2.1

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.0.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)ec1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(12h\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)t3

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.1.0

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.1\(2\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(27\)sv1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(26\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(24\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(21\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.1\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1eo

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(20\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xd1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(27\)sv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(27\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(23\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ec

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(23\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.2.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(21a\)

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(12g\)

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.1\(0\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1eb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.0\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)ew

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0sv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)ea1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)ec

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ew

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(24\)s4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)eo

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1eu

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.0\(2\)

Trust: 1.0

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(20\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0\(23\)s4

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:4.1\(3\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)e1

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.3.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc1

Trust: 1.0

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.4.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ea

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(20\)ew1

Trust: 1.0

vendor:ciscomodel:ios 12.2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2scope:neversion: -

Trust: 0.9

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:ios 12.3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 s6scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.1\(3\)

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.1\(1\)

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.1\(0\)

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.1\(2\)

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.0\(2\)

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.0

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:3.4

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.1

Trust: 0.6

vendor:ciscomodel:ons 15454e optical transport platformscope: - version: -

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:4.0\(1\)

Trust: 0.6

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(6)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(5)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(23)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(21)

Trust: 0.3

vendor:ciscomodel:ios 12.2 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1euscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ew1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ewscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ec1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sv1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 svscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(9)

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.3(7.7)

Trust: 0.3

vendor:ciscomodel:ios 12.3 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xqscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xkscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xhscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 eo1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(24)

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(23.6)

Trust: 0.3

vendor:ciscomodel:ios 12.2 swscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 s2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ebscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ew2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eo1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ec2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sv2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s2scope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#162451 // BID: 10186 // JVNDB: JVNDB-2004-000154 // NVD: CVE-2004-0714 // CNNVD: CNNVD-200407-088

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2004-0714
value: MEDIUM

Trust: 1.8

CARNEGIE MELLON: VU#162451
value: 90.97

Trust: 0.8

CNNVD: CNNVD-200407-088
value: MEDIUM

Trust: 0.6

VULHUB: VHN-9144
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2004-0714
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-9144
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#162451 // VULHUB: VHN-9144 // JVNDB: JVNDB-2004-000154 // NVD: CVE-2004-0714 // CNNVD: CNNVD-200407-088

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0714

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200407-088

TYPE

Design Error

Trust: 0.9

sources: BID: 10186 // CNNVD: CNNVD-200407-088

CONFIGURATIONS

sources: NVD: CVE-2004-0714

PATCH

title:cisco-sa-20040420-snmpurl:http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2004-000154

EXTERNAL IDS

db:CERT/CCid:VU#162451

Trust: 3.3

db:USCERTid:TA04-111B

Trust: 2.9

db:BIDid:10186

Trust: 2.8

db:NVDid:CVE-2004-0714

Trust: 2.8

db:XFid:15921

Trust: 1.4

db:SECTRACKid:1009889

Trust: 0.8

db:JVNDBid:JVNDB-2004-000154

Trust: 0.8

db:CNNVDid:CNNVD-200407-088

Trust: 0.7

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5845

Trust: 0.6

db:CERT/CCid:TA04-111B

Trust: 0.6

db:CISCOid:20040420 VULNERABILITIES IN SNMP MESSAGE PROCESSING

Trust: 0.6

db:VULHUBid:VHN-9144

Trust: 0.1

db:PACKETSTORMid:33144

Trust: 0.1

sources: CERT/CC: VU#162451 // VULHUB: VHN-9144 // BID: 10186 // JVNDB: JVNDB-2004-000154 // PACKETSTORM: 33144 // NVD: CVE-2004-0714 // CNNVD: CNNVD-200407-088

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml

Trust: 2.8

url:http://www.us-cert.gov/cas/techalerts/ta04-111b.html

Trust: 2.8

url:http://www.securityfocus.com/bid/10186

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/162451

Trust: 2.5

url:http://xforce.iss.net/xforce/xfdb/15921

Trust: 1.4

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5845

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/15921

Trust: 1.1

url:http://www.ietf.org/rfc/rfc1157.txt

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/o-125.shtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0714

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20040421-cisco_snmp.html

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr041701.txt

Trust: 0.8

url:http://www.jpcert.or.jp/at/2004/at040004.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta04-111b/

Trust: 0.8

url:http://jvn.jp/tr/trta04-111b/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0714

Trust: 0.8

url:http://www.securitytracker.com/alerts/2004/apr/1009889.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2004/20040421_113629.html

Trust: 0.8

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5845

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta04-111b.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

sources: CERT/CC: VU#162451 // VULHUB: VHN-9144 // BID: 10186 // JVNDB: JVNDB-2004-000154 // PACKETSTORM: 33144 // NVD: CVE-2004-0714 // CNNVD: CNNVD-200407-088

CREDITS

Cisco PSIRT※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200407-088

SOURCES

db:CERT/CCid:VU#162451
db:VULHUBid:VHN-9144
db:BIDid:10186
db:JVNDBid:JVNDB-2004-000154
db:PACKETSTORMid:33144
db:NVDid:CVE-2004-0714
db:CNNVDid:CNNVD-200407-088

LAST UPDATE DATE

2023-12-18T13:45:32.441000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#162451date:2004-04-21T00:00:00
db:VULHUBid:VHN-9144date:2018-10-30T00:00:00
db:BIDid:10186date:2015-03-19T08:23:00
db:JVNDBid:JVNDB-2004-000154date:2007-04-01T00:00:00
db:NVDid:CVE-2004-0714date:2018-10-30T16:26:17.310
db:CNNVDid:CNNVD-200407-088date:2009-03-04T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#162451date:2004-04-20T00:00:00
db:VULHUBid:VHN-9144date:2004-07-27T00:00:00
db:BIDid:10186date:2004-04-20T00:00:00
db:JVNDBid:JVNDB-2004-000154date:2007-04-01T00:00:00
db:PACKETSTORMid:33144date:2004-04-20T20:03:00
db:NVDid:CVE-2004-0714date:2004-07-27T04:00:00
db:CNNVDid:CNNVD-200407-088date:2004-04-20T00:00:00