ID CVE-2007-0917
Type cve
Reporter cve@mitre.org
Modified 2017-10-11T01:31:00
Description
The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets.
{"id": "CVE-2007-0917", "bulletinFamily": "NVD", "title": "CVE-2007-0917", "description": "The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets.", "published": "2007-02-14T02:28:00", "modified": "2017-10-11T01:31:00", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0917", "reporter": "cve@mitre.org", "references": ["http://osvdb.org/33052", "https://exchange.xforce.ibmcloud.com/vulnerabilities/32473", "http://www.securitytracker.com/id?1017631", "http://secunia.com/advisories/24142", "http://www.securityfocus.com/bid/22549", "http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html", "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml", "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5858", "http://www.vupen.com/english/advisories/2007/0597"], "cvelist": ["CVE-2007-0917"], "type": "cve", "lastseen": "2019-05-29T18:08:58", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "8bae3b0e40b66a21d262b0dc674aeac9"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "3e784ecda24b8d57d84fc9e1761f977c"}, {"key": "cpe23", "hash": "1980b90540368d48274635133850d754"}, {"key": "cvelist", "hash": "753318b9901a41ed0383feb6923d1163"}, {"key": "cvss", "hash": "0b87419295d927d4e06fbb2171061bc6"}, {"key": "cvss2", "hash": "bcb39ea622652e3d23ed488b49c7a0bf"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "bd191d64db5713b683c28091ed979c4e"}, {"key": "href", "hash": "906eab208fd557442339a1cdbc3eabe8"}, {"key": "modified", "hash": "ff318a5b951f747bdf7782c6bc63531b"}, {"key": "published", "hash": "2e3f48c5dcda005590f47a097670f513"}, {"key": "references", "hash": "9c4fbe24ebead7721fa5f05927a6a5e8"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "4239b72935a942093b71d3bb2890aa74"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "b2d4e9c6bc83197af00ff89705420cac22b0109a9ab6053de19056be5d972bfc", "viewCount": 0, "enchantments": {"score": {"value": 6.9, "vector": "NONE", "modified": "2019-05-29T18:08:58"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:33052"]}, {"type": "nessus", "idList": ["CSCSG15598.NASL", "CISCO-SA-20070213-IOSIPSHTTP.NASL"]}, {"type": "cisco", "idList": ["CISCO-SA-20070213-IOSIPS"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7235"]}], "modified": "2019-05-29T18:08:58"}, "vulnersScore": 6.9}, "objectVersion": "1.3", "cpe": ["cpe:/o:cisco:ios:12.3yi", "cpe:/a:cisco:ios:12.4t", "cpe:/a:cisco:ios:12.3xw", "cpe:/a:cisco:ios:12.3yd", "cpe:/a:cisco:ios:12.3yk", "cpe:/o:cisco:ios:12.3yt", "cpe:/a:cisco:ios:12.3xy", "cpe:/a:cisco:ios:12.3yz", "cpe:/a:cisco:ios:12.4xa", "cpe:/o:cisco:ios:12.3yj", "cpe:/a:cisco:ios:12.3ya", "cpe:/a:cisco:ios:12.3yg", "cpe:/a:cisco:ios:12.4xb", "cpe:/a:cisco:ios:12.3yj", "cpe:/a:cisco:ios:12.3yt", "cpe:/o:cisco:ios:12.3xr", "cpe:/a:cisco:ios:12.3xq", "cpe:/o:cisco:ios:12.3ys", "cpe:/o:cisco:ios:12.3yq", "cpe:/o:cisco:ios:12.3xq", "cpe:/a:cisco:ios:12.3yq", "cpe:/o:cisco:ios:12.3ya", "cpe:/o:cisco:ios:12.4", "cpe:/o:cisco:ios:12.3t", "cpe:/o:cisco:ios:12.3yx", "cpe:/a:cisco:ios:12.3xs", "cpe:/a:cisco:ios:12.3yh", "cpe:/a:cisco:ios:12.3yx", "cpe:/o:cisco:ios:12.3xx", "cpe:/o:cisco:ios:12.4xb", "cpe:/o:cisco:ios:12.3yk", "cpe:/o:cisco:ios:12.3yz", "cpe:/a:cisco:ios:12.3ym", "cpe:/a:cisco:ios:12.3xr", "cpe:/o:cisco:ios:12.3yg", "cpe:/o:cisco:ios:12.4xa", "cpe:/o:cisco:ios:12.3yh", "cpe:/a:cisco:ios:12.4", "cpe:/a:cisco:ios:12.3xx", "cpe:/o:cisco:ios:12.4mr", "cpe:/a:cisco:ios:12.4mr", "cpe:/a:cisco:ios:12.3t", "cpe:/o:cisco:ios:12.3xw", "cpe:/o:cisco:ios:12.3ym", "cpe:/o:cisco:ios:12.3xy", "cpe:/o:cisco:ios:12.4t", "cpe:/a:cisco:ios:12.3ys", "cpe:/a:cisco:ios:12.3yi", "cpe:/o:cisco:ios:12.3yd", "cpe:/o:cisco:ios:12.3xs"], "affectedSoftware": [{"name": "cisco ios", "operator": "eq", "version": "12.4mr"}, {"name": "cisco ios", "operator": "eq", "version": "12.3ym"}, {"name": "cisco ios", "operator": "eq", "version": "12.4"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yi"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xq"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yg"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xs"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xy"}, {"name": "cisco ios", "operator": "eq", "version": "12.3ya"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yd"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xr"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yh"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xx"}, {"name": "cisco ios", "operator": "eq", "version": "12.4xb"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yk"}, {"name": "cisco ios", "operator": "eq", "version": "12.3ys"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yx"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yz"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yt"}, {"name": "cisco ios", "operator": "eq", "version": "12.3t"}, {"name": "cisco ios", "operator": "eq", "version": "12.4xa"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yq"}, {"name": "cisco ios", "operator": "eq", "version": "12.4t"}, {"name": "cisco ios", "operator": "eq", "version": "12.3yj"}, {"name": "cisco ios", "operator": "eq", "version": "12.3xw"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"osvdb": [{"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml)\n[Vendor Specific Advisory URL](http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html)\n[Vendor Specific Advisory URL](http://www.cisco.com/warp/public/707/cisco-sa-20070213-iosips.shtml)\nSecurity Tracker: 1017631\n[Secunia Advisory ID:24142](https://secuniaresearch.flexerasoftware.com/advisories/24142/)\n[Related OSVDB ID: 33053](https://vulners.com/osvdb/OSVDB:33053)\nNews Article: http://www.informationweek.com/news/showArticle.jhtml?articleID=197005905\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0198.html\nISS X-Force ID: 32473\nFrSIRT Advisory: ADV-2007-0597\n[CVE-2007-0917](https://vulners.com/cve/CVE-2007-0917)\nBugtraq ID: 22549\n", "modified": "2007-02-13T10:34:05", "published": "2007-02-13T10:34:05", "href": "https://vulners.com/osvdb/OSVDB:33052", "id": "OSVDB:33052", "title": "Cisco IOS IPS Fragmented Packet Signature Bypass", "type": "osvdb", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2019-11-01T02:03:43", "bulletinFamily": "scanner", "description": "The remote version of IOS contains an intrusion prevention system\nthat is affected by a fragmented packet evasion vulnerability and a\ndenial of service vulnerability. \n\nAn attacker might use these flaws to disable this device remotely or to \nsneak past the IPS.", "modified": "2019-11-02T00:00:00", "id": "CSCSG15598.NASL", "href": "https://www.tenable.com/plugins/nessus/24739", "published": "2007-03-01T00:00:00", "title": "Cisco IOS Intrusion Prevention System (IPS) Multiple Vulnerabilities (CSCsa53334, CSCsg15598)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(24739);\n script_cve_id(\"CVE-2007-0917\", \"CVE-2007-0918\");\n script_bugtraq_id(22549);\n script_version(\"1.18\");\n\n script_name(english:\"Cisco IOS Intrusion Prevention System (IPS) Multiple Vulnerabilities (CSCsa53334, CSCsg15598)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CISCO device can be crashed remotely.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote version of IOS contains an intrusion prevention system\nthat is affected by a fragmented packet evasion vulnerability and a\ndenial of service vulnerability. \n\nAn attacker might use these flaws to disable this device remotely or to \nsneak past the IPS.\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.nessus.org/u?16b1f263\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/03/01\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2007/02/13\");\n script_cvs_date(\"Date: 2018/06/27 18:42:25\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value: \"cpe:/o:cisco:ios\");\n script_end_attributes();\n\n summary[\"english\"] = \"Uses SNMP to determine if a flaw is present\";\n script_summary(english:summary[\"english\"]);\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n\n script_family(english:\"CISCO\");\n\n script_dependencie(\"snmp_sysDesc.nasl\", \"snmp_cisco_type.nasl\");\n script_require_keys(\"SNMP/community\", \"SNMP/sysDesc\", \"CISCO/model\");\n exit(0);\n}\n\n\ninclude('cisco_func.inc');\n\nos = get_kb_item(\"SNMP/sysDesc\"); if(!os)exit(0);\nversion = extract_version(os);\nif ( ! version ) exit(0);\n\n\n\n# 12.3 Deprecated\nif ( deprecated_version(version, \"12.3XQ\", \"12.3XR\", \"12.3XS\", \"12.3XW\", \"12.3XX\", \"12.3XY\", \"12.3YA\", \"12.3YD\", \"12.3YG\", \"12.3YH\", \"12.3YI\", \"12.3YJ\", \"12.3YK\", \"12.3YS\", \"12.3YT\") ) vuln ++;\n\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.3(2)T\", \"12.3(4)T\", \"12.3(7)T\", \"12.3(11)T10\", \"12.3(14)T7\"),\n\t\t newest:\"12.3(14)T7\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.3(14)YM5\"),\n\t\t newest:\"12.3(14)YM5\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.3(14)YQ8\"),\n\t\t newest:\"12.3(14)YQ8\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.3(14)YX3\"),\n\t\t newest:\"12.3(14)YX3\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.3(11)YZ\"),\n\t\t newest:\"12.3(11)YZ\") ) vuln ++;\n# 12.4\n\nif ( deprecated_version(version, \"12.4XE\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.4(1c)\", \"12.4(3b)\", \"12.4(5)\", \"12.4(7e)\", \"12.4(10b)\", \"12.4(12)\"),\n\t\t newest:\"12.4(12)\") ) vuln ++;\n\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.4(6)MR1\"),\n\t\t newest:\"12.4(6)MR1\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.4(2)T3\", \"12.4(4)T\", \"12.4(6)T\", \"12.4(9)T3\", \"12.4(11)T1\"),\n\t\t newest:\"12.4(11)T1\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.4(2)XA2\"),\n\t\t newest:\"12.4(2)XA2\") ) vuln ++;\n\nif ( check_release(version:version,\n\t\t patched:make_list(\"12.4(2)XB3\"),\n\t\t newest:\"12.4(2)XB3\") ) vuln ++;\n\nif ( vuln == 1 ) security_hole(port:161, proto:\"udp\");\nelse if ( vuln > 1 ) display(\"IOS version \", version, \" identified as vulnerable by multiple checks\\n\");\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-11-01T02:17:58", "bulletinFamily": "scanner", "description": "The Intrusion Prevention System (IPS) feature set of Cisco IOS\ncontains several vulnerabilities. These include: \n\n - Fragmented IP packets may be used to evade\n signature inspection. (CVE-2007-0917)\n\n - IPS signatures utilizing the regular expression\n feature of the ATOMIC.TCP signature engine may\n cause a router to crash resulting in a denial\n of service. (CVE-2007-0918)", "modified": "2019-11-02T00:00:00", "id": "CISCO-SA-20070213-IOSIPSHTTP.NASL", "href": "https://www.tenable.com/plugins/nessus/49000", "published": "2010-09-01T00:00:00", "title": "Multiple IOS IPS Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# Security advisory is (C) CISCO, Inc.\n# See https://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(49000);\n script_version(\"1.13\");\n script_cve_id(\"CVE-2007-0917\", \"CVE-2007-0918\");\n script_bugtraq_id(22549);\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCsa53334\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCsg15598\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20070213-iosips\");\n\n script_name(english:\"Multiple IOS IPS Vulnerabilities\");\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is missing a vendor-supplied security patch.\" );\n script_set_attribute(attribute:\"description\", value:\n'The Intrusion Prevention System (IPS) feature set of Cisco IOS\ncontains several vulnerabilities. These include: \n\n - Fragmented IP packets may be used to evade\n signature inspection. (CVE-2007-0917)\n\n - IPS signatures utilizing the regular expression\n feature of the ATOMIC.TCP signature engine may\n cause a router to crash resulting in a denial\n of service. (CVE-2007-0918)'\n );\n script_set_attribute(attribute:\"see_also\", value: \"http://www.nessus.org/u?644ae844\");\n # https://www.cisco.com/en/US/products/products_security_advisory09186a00807e0a5b.shtml\n script_set_attribute(attribute:\"see_also\", value: \"http://www.nessus.org/u?a7d0ea33\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the relevant patch referenced in Cisco Security Advisory\ncisco-sa-20070213-iosips.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n script_set_attribute(attribute:\"plugin_type\", value: \"local\");\n script_set_attribute(attribute:\"cpe\", value: \"cpe:/o:cisco:ios\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2007/02/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value: \"2007/02/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2010/09/01\");\n script_cvs_date(\"Date: 2018/11/15 20:50:20\");\n\n script_end_attributes();\n script_summary(english:\"Uses SNMP to determine if a flaw is present\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is (C) 2010-2018 Tenable Network Security, Inc.\");\n script_family(english:\"CISCO\");\n script_dependencie(\"cisco_ios_version.nasl\");\n script_require_keys(\"Host/Cisco/IOS/Version\");\n exit(0);\n}\ninclude(\"cisco_func.inc\");\n\n#\n\nversion = get_kb_item_or_exit(\"Host/Cisco/IOS/Version\");\n\nif (version == '12.4(6)XE2')\n security_hole(0);\nelse if (version == '12.4(6)XE1')\n security_hole(0);\nelse if (version == '12.4(6)XE')\n security_hole(0);\nelse if (version == '12.4(2)XA2')\n security_hole(0);\nelse if (version == '12.4(2)XA1')\n security_hole(0);\nelse if (version == '12.4(2)XA')\n security_hole(0);\nelse if (version == '12.4(11)T')\n security_hole(0);\nelse if (version == '12.4(9)T2')\n security_hole(0);\nelse if (version == '12.4(9)T1')\n security_hole(0);\nelse if (version == '12.4(9)T')\n security_hole(0);\nelse if (version == '12.4(2)T2')\n security_hole(0);\nelse if (version == '12.4(2)T1')\n security_hole(0);\nelse if (version == '12.4(2)T')\n security_hole(0);\nelse if (version == '12.4(10a)')\n security_hole(0);\nelse if (version == '12.4(10)')\n security_hole(0);\nelse if (version == '12.4(8c)')\n security_hole(0);\nelse if (version == '12.4(8b)')\n security_hole(0);\nelse if (version == '12.4(8a)')\n security_hole(0);\nelse if (version == '12.4(8)')\n security_hole(0);\nelse if (version == '12.4(7d)')\n security_hole(0);\nelse if (version == '12.4(7c)')\n security_hole(0);\nelse if (version == '12.4(7b)')\n security_hole(0);\nelse if (version == '12.4(7a)')\n security_hole(0);\nelse if (version == '12.4(7)')\n security_hole(0);\nelse if (version == '12.4(3a)')\n security_hole(0);\nelse if (version == '12.4(3)')\n security_hole(0);\nelse if (version == '12.4(1b)')\n security_hole(0);\nelse if (version == '12.4(1a)')\n security_hole(0);\nelse if (version == '12.4(1)')\n security_hole(0);\nelse if (version == '12.3(8)ZA')\n security_hole(0);\nelse if (version == '12.3(14)YT1')\n security_hole(0);\nelse if (version == '12.3(14)YT')\n security_hole(0);\nelse if (version == '12.3(11)YS1')\n security_hole(0);\nelse if (version == '12.3(11)YS')\n security_hole(0);\nelse if (version == '12.3(14)YM4')\n security_hole(0);\nelse if (version == '12.3(14)YM3')\n security_hole(0);\nelse if (version == '12.3(14)YM2')\n security_hole(0);\nelse if (version == '12.3(11)YK2')\n security_hole(0);\nelse if (version == '12.3(11)YK1')\n security_hole(0);\nelse if (version == '12.3(11)YK')\n security_hole(0);\nelse if (version == '12.3(8)YI3')\n security_hole(0);\nelse if (version == '12.3(8)YI2')\n security_hole(0);\nelse if (version == '12.3(8)YI1')\n security_hole(0);\nelse if (version == '12.3(8)YH')\n security_hole(0);\nelse if (version == '12.3(8)YG5')\n security_hole(0);\nelse if (version == '12.3(8)YG4')\n security_hole(0);\nelse if (version == '12.3(8)YG3')\n security_hole(0);\nelse if (version == '12.3(8)YG2')\n security_hole(0);\nelse if (version == '12.3(8)YG1')\n security_hole(0);\nelse if (version == '12.3(8)YG')\n security_hole(0);\nelse if (version == '12.3(8)YD1')\n security_hole(0);\nelse if (version == '12.3(8)YD')\n security_hole(0);\nelse if (version == '12.3(8)YA1')\n security_hole(0);\nelse if (version == '12.3(8)YA')\n security_hole(0);\nelse if (version == '12.3(8)XX1')\n security_hole(0);\nelse if (version == '12.3(8)XX')\n security_hole(0);\nelse if (version == '12.3(7)XS2')\n security_hole(0);\nelse if (version == '12.3(7)XS1')\n security_hole(0);\nelse if (version == '12.3(7)XS')\n security_hole(0);\nelse if (version == '12.3(7)XR6')\n security_hole(0);\nelse if (version == '12.3(7)XR5')\n security_hole(0);\nelse if (version == '12.3(7)XR4')\n security_hole(0);\nelse if (version == '12.3(7)XR3')\n security_hole(0);\nelse if (version == '12.3(7)XR2')\n security_hole(0);\nelse if (version == '12.3(7)XR')\n security_hole(0);\nelse if (version == '12.3(4)XQ1')\n security_hole(0);\nelse if (version == '12.3(4)XQ')\n security_hole(0);\nelse if (version == '12.3(11)XL1')\n security_hole(0);\nelse if (version == '12.3(11)XL')\n security_hole(0);\nelse if (version == '12.3(14)T3')\n security_hole(0);\nelse if (version == '12.3(14)T2')\n security_hole(0);\nelse if (version == '12.3(14)T1')\n security_hole(0);\nelse if (version == '12.3(14)T')\n security_hole(0);\nelse if (version == '12.3(11)T8')\n security_hole(0);\nelse if (version == '12.3(11)T7')\n security_hole(0);\nelse if (version == '12.3(11)T6')\n security_hole(0);\nelse if (version == '12.3(11)T5')\n security_hole(0);\nelse if (version == '12.3(11)T4')\n security_hole(0);\nelse if (version == '12.3(11)T3')\n security_hole(0);\nelse if (version == '12.3(11)T2')\n security_hole(0);\nelse if (version == '12.3(11)T')\n security_hole(0);\nelse if (version == '12.3(8)T9')\n security_hole(0);\nelse if (version == '12.3(8)T8')\n security_hole(0);\nelse if (version == '12.3(8)T7')\n security_hole(0);\nelse if (version == '12.3(8)T6')\n security_hole(0);\nelse if (version == '12.3(8)T5')\n security_hole(0);\nelse if (version == '12.3(8)T4')\n security_hole(0);\nelse if (version == '12.3(8)T3')\n security_hole(0);\nelse if (version == '12.3(8)T11')\n security_hole(0);\nelse if (version == '12.3(8)T10')\n security_hole(0);\nelse if (version == '12.3(8)T1')\n security_hole(0);\nelse if (version == '12.3(8)T')\n security_hole(0);\nelse\n exit(0, 'The host is not affected.');\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "cisco": [{"lastseen": "2019-05-29T15:33:21", "bulletinFamily": "software", "description": "", "modified": "2007-02-13T16:00:00", "published": "2007-02-13T16:00:00", "id": "CISCO-SA-20070213-IOSIPS", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070213-iosips", "type": "cisco", "title": "Multiple IOS IPS Vulnerabilities", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:23", "bulletinFamily": "software", "description": "Protection bypass with fragmented IP packets. DoS if regular expressions are used.", "modified": "2007-02-14T00:00:00", "published": "2007-02-14T00:00:00", "id": "SECURITYVULNS:VULN:7235", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7235", "title": "Multiple Cisco IOS IPS security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}